2020-02-21 20:06:57,725 - xtesting.ci.run_tests - INFO - Deployment description: +-------------------------+----------------------------------------------------------------------------------------------------------------------+ | ENV VAR | VALUE | +-------------------------+----------------------------------------------------------------------------------------------------------------------+ | CI_LOOP | daily | | DEBUG | true | | DEPLOY_SCENARIO | os-ovn-nofeature-noha | | INSTALLER_TYPE | unknown | | BUILD_TAG | 1F3V8OGQVKV3 | | NODE_NAME | lf-pod4-2 | | TEST_DB_URL | http://testresults.opnfv.org/test/api/v1/results | | TEST_DB_EXT_URL | | | S3_ENDPOINT_URL | https://storage.googleapis.com | | S3_DST_URL | s3://artifacts.opnfv.org/functest/1F3V8OGQVKV3/functest-ovn-opnfv-functest-smoke-jerma-neutron_trunk-run-2 | | HTTP_DST_URL | http://artifacts.opnfv.org/functest/1F3V8OGQVKV3/functest-ovn-opnfv-functest-smoke-jerma-neutron_trunk-run-2 | +-------------------------+----------------------------------------------------------------------------------------------------------------------+ 2020-02-21 20:06:57,731 - xtesting.ci.run_tests - INFO - Sourcing env file /var/lib/xtesting/conf/env_file export OS_AUTH_URL=http://172.30.12.85/identity/v3 export OS_PROJECT_NAME="demo" export OS_USER_DOMAIN_NAME="Default" export OS_PROJECT_DOMAIN_NAME="Default" export OS_USERNAME="admin" export OS_PASSWORD="secret" export OS_REGION_NAME="RegionOne" export OS_INTERFACE=public export OS_IDENTITY_API_VERSION=3 2020-02-21 20:06:57,731 - xtesting.ci.run_tests - DEBUG - Test args: neutron_trunk 2020-02-21 20:06:57,802 - xtesting.ci.run_tests - INFO - Loading test case 'neutron_trunk'... 2020-02-21 20:06:58,573 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3 -H "Accept: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" 2020-02-21 20:06:58,583 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 256 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:58 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3e50573d-c2b8-4bdf-9f8b-975ae44657e6 2020-02-21 20:06:58,583 - keystoneauth.session - DEBUG - RESP BODY: {"version": {"status": "stable", "updated": "2019-07-19T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.13", "links": [{"href": "http://172.30.12.85/identity/v3/", "rel": "self"}]}} 2020-02-21 20:06:58,583 - keystoneauth.session - DEBUG - GET call to http://172.30.12.85/identity/v3 used request id req-3e50573d-c2b8-4bdf-9f8b-975ae44657e6 2020-02-21 20:06:58,584 - keystoneauth.identity.v3.base - DEBUG - Making authentication request to http://172.30.12.85/identity/v3/auth/tokens 2020-02-21 20:06:58,625 - keystoneauth.identity.v3.base - DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "163d5d16a01d43c3bf579e79818c43ff", "name": "reader"}, {"id": "7f0816cbc4834584826cdd3049970cca", "name": "member"}, {"id": "fdaf27b046a444febc27b149904b994f", "name": "admin"}], "expires_at": "2020-02-21T21:06:58.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3a550fb8c83e4161886059d8b8d86710", "name": "demo"}, "catalog": [{"endpoints": [{"url": "http://172.30.12.85/heat-api-cfn/v1", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "143c25f3c7024dfa961f47a8ebd5777e"}, {"url": "http://172.30.12.85/heat-api-cfn/v1", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "90eb7f2154574cbf98089313ab62455c"}, {"url": "http://172.30.12.85/heat-api-cfn/v1", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "9f9b73b2a469472fbecf17f12e5609ca"}], "type": "cloudformation", "id": "193b2cc1e33741bc9b319e1ba234998c", "name": "heat-cfn"}, {"endpoints": [{"url": "http://172.30.12.85/placement", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "b1210e35c01b46b1ab567895e5a60f69"}], "type": "placement", "id": "3bbaf5638ffb4e81ba79b7aaf651c9cb", "name": "placement"}, {"endpoints": [{"url": "http://172.30.12.85/volume/v3/3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "7c53a84423214a24adb68a97aa3ed746"}], "type": "volumev3", "id": "41bdc1adf58546ec996f6d886ac0fb39", "name": "cinderv3"}, {"endpoints": [{"url": "http://172.30.12.85/image", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "32809a03d41e45228607caa47d91b1b9"}], "type": "image", "id": "4443c6dd64554f6fadf6fe903b2dde37", "name": "glance"}, {"endpoints": [{"url": "http://172.30.12.85/heat-api/v1/3a550fb8c83e4161886059d8b8d86710", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "3066dfd0ba844206b2178264c81ebbd8"}, {"url": "http://172.30.12.85/heat-api/v1/3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "b2f5057867334f14b2ed801b5045f560"}, {"url": "http://172.30.12.85/heat-api/v1/3a550fb8c83e4161886059d8b8d86710", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "c7e318982e464437b59b532657adea6f"}], "type": "orchestration", "id": "4e4ec70109e0489293df3dd48c64a0ce", "name": "heat"}, {"endpoints": [{"url": "http://172.30.12.85/volume/v2/3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "cf604e22b17a4f34910cda7115880057"}], "type": "volumev2", "id": "6767c456260a4ee59d6da3befe497a1c", "name": "cinderv2"}, {"endpoints": [{"url": "http://172.30.12.85:9696/", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "7c56ff288c83469d87e95a66013b4b89"}], "type": "network", "id": "6d73608e9394412495c3b3656656d2f0", "name": "neutron"}, {"endpoints": [{"url": "http://172.30.12.85/identity", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "76cf0885fa234870b38271eb24c91e07"}, {"url": "http://172.30.12.85/identity", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "b3963ef213834210bb5531b239e82cca"}], "type": "identity", "id": "7599561d05e947f3996e4ea2936a97d1", "name": "keystone"}, {"endpoints": [{"url": "http://172.30.12.85/volume/v3/3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "6aa8408d105d40c8a6f0d5dd59ed7491"}], "type": "block-storage", "id": "75f83a219d824db9ac915e82ae02bc34", "name": "cinder"}, {"endpoints": [{"url": "http://172.30.12.85/compute/v2/3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "a7397cc23b4c4c378845098590337214"}], "type": "compute_legacy", "id": "a56834275f134853aa8b121915646821", "name": "nova_legacy"}, {"endpoints": [{"url": "http://172.30.12.85:8080", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "3942df8794c14310818ff279a07fade9"}, {"url": "http://172.30.12.85:8080", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "76c980c075cc407781a0170b8dc39986"}, {"url": "http://172.30.12.85:8080", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "e9fb70db9d474144a375bfc5f8bf0a19"}], "type": "s3", "id": "a7af79443d0b4c739b9900f3a2928e29", "name": "s3"}, {"endpoints": [{"url": "http://172.30.12.85/key-manager", "interface": "internal", "region": "RegionOne", "region_id": "RegionOne", "id": "0db709cab44f4d25b9164c252b829876"}, {"url": "http://172.30.12.85/key-manager", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "bc5b98a24c06406ca488789ea34ac3ef"}], "type": "key-manager", "id": "bfc58c99be2e43acaa46ad49bb30313b", "name": "barbican"}, {"endpoints": [{"url": "http://172.30.12.85/compute/v2.1", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "6eefbbba1c134fc3b5d00245e4eeb7cd"}], "type": "compute", "id": "f066c584e6f54f49b761bb56e594aea8", "name": "nova"}, {"endpoints": [{"url": "http://172.30.12.85:8080", "interface": "admin", "region": "RegionOne", "region_id": "RegionOne", "id": "0693e96bd28f4245a684f46016eb58ba"}, {"url": "http://172.30.12.85:8080/v1/AUTH_3a550fb8c83e4161886059d8b8d86710", "interface": "public", "region": "RegionOne", "region_id": "RegionOne", "id": "92c9a5b97aae4c2ab57c541ae0166a53"}], "type": "object-store", "id": "f08bac0b28824ff9b49f90f51c1996fb", "name": "swift"}], "user": {"password_expires_at": null, "domain": {"id": "default", "name": "Default"}, "id": "b24f76739270471bb64eebf6e3646601", "name": "admin"}, "audit_ids": ["R8BSiqDpRnyhkKZ4Am-dNw"], "issued_at": "2020-02-21T20:06:58.000000Z"}} 2020-02-21 20:06:58,629 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.networks 2020-02-21 20:06:58,629 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85:9696/v2.0/networks.json?router%3Aexternal=True" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:58,857 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 782 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:58 GMT X-Openstack-Request-Id: req-68946aa4-6e3d-4de2-aeb1-ffde1dfcb892 2020-02-21 20:06:58,863 - keystoneauth.session - DEBUG - RESP BODY: {"networks":[{"provider:physical_network":"public","updated_at":"2020-02-21T01:18:39Z","dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1400,"id":"cc73a4a8-eda0-4345-b031-0faf5535ddc1","router:external":true,"availability_zone_hints":[],"availability_zones":[],"name":"public","ipv4_address_scope":null,"shared":false,"project_id":"457b822374de45b5a7624827c06b5ff5","l2_adjacency":true,"status":"ACTIVE","subnets":["32f6c915-45c6-4b3e-a816-f9e5eef96759","b8bece0a-ddbb-4741-b7ca-cf139e335f8e"],"description":"gman","tags":[],"ipv6_address_scope":null,"is_default":true,"provider:segmentation_id":null,"qos_policy_id":null,"admin_state_up":true,"tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T00:59:53Z","provider:network_type":"flat"}]} 2020-02-21 20:06:58,865 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json?router%3Aexternal=True used request id req-68946aa4-6e3d-4de2-aeb1-ffde1dfcb892 2020-02-21 20:06:58,866 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.networks in 0.2366044521331787s 2020-02-21 20:06:58,867 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json?router%3Aexternal=True used request id req-68946aa4-6e3d-4de2-aeb1-ffde1dfcb892 2020-02-21 20:06:58,871 - functest.core.tenantnetwork - DEBUG - password: Bf,4K[?ob5!f}AlNqF@N,nadxy_[iN 2020-02-21 20:06:58,879 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity -H "Accept: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" 2020-02-21 20:06:58,892 - keystoneauth.session - DEBUG - RESP: [300] Connection: close Content-Length: 271 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:58 GMT Location: http://172.30.12.85/identity/v3/ Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-e260dfc3-5a35-4ef7-aebe-8da78943c991 2020-02-21 20:06:58,892 - keystoneauth.session - DEBUG - RESP BODY: {"versions": {"values": [{"status": "stable", "updated": "2019-07-19T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.13", "links": [{"href": "http://172.30.12.85/identity/v3/", "rel": "self"}]}]}} 2020-02-21 20:06:58,892 - keystoneauth.session - DEBUG - GET call to http://172.30.12.85/identity used request id req-e260dfc3-5a35-4ef7-aebe-8da78943c991 2020-02-21 20:06:58,893 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.domains 2020-02-21 20:06:58,895 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/domains -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:58,953 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 811 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:58 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-221136cb-476d-491e-84af-bca0ef069893 2020-02-21 20:06:58,954 - keystoneauth.session - DEBUG - RESP BODY: {"domains": [{"description": "Used for swift functional testing", "links": {"self": "http://172.30.12.85/identity/v3/domains/a44f5c1830f344f79a8e1106566b695b"}, "tags": [], "enabled": true, "options": {}, "id": "a44f5c1830f344f79a8e1106566b695b", "name": "swift_test"}, {"description": "The default domain", "links": {"self": "http://172.30.12.85/identity/v3/domains/default"}, "tags": [], "enabled": true, "options": {}, "id": "default", "name": "Default"}, {"description": "Owns users and projects created by heat", "links": {"self": "http://172.30.12.85/identity/v3/domains/e9cfe98ff983445dabaabfd0b0395735"}, "tags": [], "enabled": true, "options": {}, "id": "e9cfe98ff983445dabaabfd0b0395735", "name": "heat"}], "links": {"self": "http://172.30.12.85/identity/v3/domains", "previous": null, "next": null}} 2020-02-21 20:06:58,954 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains used request id req-221136cb-476d-491e-84af-bca0ef069893 2020-02-21 20:06:58,954 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.domains in 0.06086134910583496s 2020-02-21 20:06:58,954 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains used request id req-221136cb-476d-491e-84af-bca0ef069893 2020-02-21 20:06:58,960 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.POST.projects 2020-02-21 20:06:58,963 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/identity/v3/projects -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"project": {"domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139", "description": "Created by OPNFV Functest: neutron_trunk", "enabled": true}}' 2020-02-21 20:06:59,023 - keystoneauth.session - DEBUG - RESP: [201] Connection: close Content-Length: 393 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:58 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-625eeed9-5096-47cf-9808-d35c17b563aa 2020-02-21 20:06:59,024 - keystoneauth.session - DEBUG - RESP BODY: {"project": {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}} 2020-02-21 20:06:59,024 - keystoneauth.session - DEBUG - POST call to identity for http://172.30.12.85/identity/v3/projects used request id req-625eeed9-5096-47cf-9808-d35c17b563aa 2020-02-21 20:06:59,024 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.POST.projects in 0.06385254859924316s 2020-02-21 20:06:59,024 - shade.request_ids - DEBUG - POST call to identity for http://172.30.12.85/identity/v3/projects used request id req-625eeed9-5096-47cf-9808-d35c17b563aa 2020-02-21 20:06:59,025 - functest.core.tenantnetwork - DEBUG - project: Munch({'location': Munch({'cloud': 'envvars', 'region_name': None, 'zone': None, 'project': Munch({'id': 'default', 'name': None, 'domain_id': 'default', 'domain_name': None})}), 'id': '3bb960f3511b4610bdd88acf066f912d', 'name': 'neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'description': 'Created by OPNFV Functest: neutron_trunk', 'is_enabled': True, 'is_domain': False, 'domain_id': 'default', 'properties': Munch({'tags': [], 'options': Munch({})}), 'enabled': True, 'parent_id': 'default', 'tags': [], 'options': Munch({})}) 2020-02-21 20:06:59,031 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.POST.users 2020-02-21 20:06:59,034 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/identity/v3/users -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"user": {"domain_id": "default", "name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "password": "Bf,4K[?ob5!f}AlNqF@N,nadxy_[iN", "email": null, "enabled": true, "description": null}}' 2020-02-21 20:06:59,167 - keystoneauth.session - DEBUG - RESP: [201] Connection: close Content-Length: 334 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-5ec8c24a-e5d2-485d-910b-9a382696301d 2020-02-21 20:06:59,167 - keystoneauth.session - DEBUG - RESP BODY: {"user": {"name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "domain_id": "default", "password_expires_at": null}} 2020-02-21 20:06:59,168 - keystoneauth.session - DEBUG - POST call to identity for http://172.30.12.85/identity/v3/users used request id req-5ec8c24a-e5d2-485d-910b-9a382696301d 2020-02-21 20:06:59,168 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.POST.users in 0.13674116134643555s 2020-02-21 20:06:59,168 - shade.request_ids - DEBUG - POST call to identity for http://172.30.12.85/identity/v3/users used request id req-5ec8c24a-e5d2-485d-910b-9a382696301d 2020-02-21 20:06:59,169 - functest.core.tenantnetwork - DEBUG - user: Munch({'id': 'e98031d447fe4df7acb26a58a9646e4d', 'email': None, 'name': 'neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'username': None, 'default_project_id': None, 'domain_id': 'default', 'enabled': True, 'description': None}) 2020-02-21 20:06:59,174 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:06:59,177 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,236 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-7ec008bf-9c90-44ba-a4b4-77d438689042 2020-02-21 20:06:59,237 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:06:59,237 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-7ec008bf-9c90-44ba-a4b4-77d438689042 2020-02-21 20:06:59,237 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.06328749656677246s 2020-02-21 20:06:59,238 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-7ec008bf-9c90-44ba-a4b4-77d438689042 2020-02-21 20:06:59,243 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:06:59,245 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,299 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-90e43317-802c-4a0a-9dcc-20fcc60ac8ae 2020-02-21 20:06:59,299 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:06:59,299 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-90e43317-802c-4a0a-9dcc-20fcc60ac8ae 2020-02-21 20:06:59,300 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.05662894248962402s 2020-02-21 20:06:59,300 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-90e43317-802c-4a0a-9dcc-20fcc60ac8ae 2020-02-21 20:06:59,306 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:06:59,308 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,365 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-345e87a1-d57e-4c5f-be49-b898dadd0f81 2020-02-21 20:06:59,365 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:06:59,365 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-345e87a1-d57e-4c5f-be49-b898dadd0f81 2020-02-21 20:06:59,365 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.05915069580078125s 2020-02-21 20:06:59,366 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-345e87a1-d57e-4c5f-be49-b898dadd0f81 2020-02-21 20:06:59,370 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.domains 2020-02-21 20:06:59,373 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/domains/default -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,415 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 200 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-8cade999-6b6b-4bd5-af81-0e1661cc1ce5 2020-02-21 20:06:59,415 - keystoneauth.session - DEBUG - RESP BODY: {"domain": {"description": "The default domain", "links": {"self": "http://172.30.12.85/identity/v3/domains/default"}, "tags": [], "enabled": true, "options": {}, "id": "default", "name": "Default"}} 2020-02-21 20:06:59,415 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-8cade999-6b6b-4bd5-af81-0e1661cc1ce5 2020-02-21 20:06:59,415 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.domains in 0.045125484466552734s 2020-02-21 20:06:59,416 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-8cade999-6b6b-4bd5-af81-0e1661cc1ce5 2020-02-21 20:06:59,417 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.users 2020-02-21 20:06:59,420 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/users?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,497 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7807 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-b1dd039a-56a3-4068-9b9f-ba88b00a093e 2020-02-21 20:06:59,498 - keystoneauth.session - DEBUG - RESP BODY: {"users": [{"password_expires_at": null, "name": "admin", "links": {"self": "http://172.30.12.85/identity/v3/users/b24f76739270471bb64eebf6e3646601"}, "domain_id": "default", "enabled": true, "id": "b24f76739270471bb64eebf6e3646601", "options": {}}, {"name": "demo", "links": {"self": "http://172.30.12.85/identity/v3/users/e16576aaf1ae4ca1a1768987d879beaf"}, "domain_id": "default", "enabled": true, "options": {}, "id": "e16576aaf1ae4ca1a1768987d879beaf", "email": "demo@example.com", "password_expires_at": null}, {"name": "alt_demo", "links": {"self": "http://172.30.12.85/identity/v3/users/8dd6688693b5400cb1045432f780a4d3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8dd6688693b5400cb1045432f780a4d3", "email": "alt_demo@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "nova", "links": {"self": "http://172.30.12.85/identity/v3/users/b0afe79fc7f54700a1679e7d8b885889"}, "domain_id": "default", "enabled": true, "id": "b0afe79fc7f54700a1679e7d8b885889", "options": {}}, {"password_expires_at": null, "name": "glance", "links": {"self": "http://172.30.12.85/identity/v3/users/68a178ee183746dcb0317b4e443e41cc"}, "domain_id": "default", "enabled": true, "id": "68a178ee183746dcb0317b4e443e41cc", "options": {}}, {"password_expires_at": null, "name": "glance-swift", "links": {"self": "http://172.30.12.85/identity/v3/users/cdc1aa602170452a96f907f4fa97b86f"}, "domain_id": "default", "enabled": true, "id": "cdc1aa602170452a96f907f4fa97b86f", "options": {}}, {"password_expires_at": null, "name": "cinder", "links": {"self": "http://172.30.12.85/identity/v3/users/c133842e0d5c4ac49a23a7da4363abd0"}, "domain_id": "default", "enabled": true, "id": "c133842e0d5c4ac49a23a7da4363abd0", "options": {}}, {"password_expires_at": null, "name": "neutron", "links": {"self": "http://172.30.12.85/identity/v3/users/973956b416c64ef2b57f493205a7bdd8"}, "domain_id": "default", "enabled": true, "id": "973956b416c64ef2b57f493205a7bdd8", "options": {}}, {"password_expires_at": null, "name": "swift", "links": {"self": "http://172.30.12.85/identity/v3/users/628e5f79587e412a96f6bc9753f9ffde"}, "domain_id": "default", "enabled": true, "id": "628e5f79587e412a96f6bc9753f9ffde", "options": {}}, {"name": "swiftusertest1", "links": {"self": "http://172.30.12.85/identity/v3/users/cc90d2b387964cb28dffa5da293ab9b3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cc90d2b387964cb28dffa5da293ab9b3", "email": "test@example.com", "password_expires_at": null}, {"name": "swiftusertest3", "links": {"self": "http://172.30.12.85/identity/v3/users/5e80a77ccabc42c792a8016d4f85308d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "5e80a77ccabc42c792a8016d4f85308d", "email": "test3@example.com", "password_expires_at": null}, {"name": "swiftusertest2", "links": {"self": "http://172.30.12.85/identity/v3/users/f6398227b24941bc9895461eca62b565"}, "domain_id": "default", "enabled": true, "options": {}, "id": "f6398227b24941bc9895461eca62b565", "email": "test2@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "placement", "links": {"self": "http://172.30.12.85/identity/v3/users/dabc1f359741415580e7e860a1cb44e1"}, "domain_id": "default", "enabled": true, "id": "dabc1f359741415580e7e860a1cb44e1", "options": {}}, {"password_expires_at": null, "name": "heat", "links": {"self": "http://172.30.12.85/identity/v3/users/40c676d7e781438785527e2ad13f9516"}, "domain_id": "default", "enabled": true, "id": "40c676d7e781438785527e2ad13f9516", "options": {}}, {"name": "barbican", "links": {"self": "http://172.30.12.85/identity/v3/users/0c600d0f83884bd79b6884495248ec12"}, "domain_id": "default", "enabled": true, "options": {}, "default_project_id": "e479343d5fff47bb96822a0889fa3366", "id": "0c600d0f83884bd79b6884495248ec12", "email": "barbican@example.com", "password_expires_at": null}, {"name": "service-admin", "links": {"self": "http://172.30.12.85/identity/v3/users/eb7c4303cff847d39b194ada83eed74d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "eb7c4303cff847d39b194ada83eed74d", "email": "service-admin@example.com", "password_expires_at": null}, {"name": "project_a_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/c501a9233eaf4ecebee0ddbbc8fc0605"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c501a9233eaf4ecebee0ddbbc8fc0605", "email": "admin_a@example.net", "password_expires_at": null}, {"name": "project_a_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/4c1f3b1f31ca4a2ab7e69329ba681b52"}, "domain_id": "default", "enabled": true, "options": {}, "id": "4c1f3b1f31ca4a2ab7e69329ba681b52", "email": "creator_a@example.net", "password_expires_at": null}, {"name": "project_a_creator_2", "links": {"self": "http://172.30.12.85/identity/v3/users/be811a0dfecb46dc8e4bf99962a1d264"}, "domain_id": "default", "enabled": true, "options": {}, "id": "be811a0dfecb46dc8e4bf99962a1d264", "email": "creator2_a@example.net", "password_expires_at": null}, {"name": "project_a_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/c48bb77a8869493f9fbba65147a19cf0"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c48bb77a8869493f9fbba65147a19cf0", "email": "observer_a@example.net", "password_expires_at": null}, {"name": "project_a_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/fdfcbb1acd984416972bf182b98eb4e5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "fdfcbb1acd984416972bf182b98eb4e5", "email": "auditor_a@example.net", "password_expires_at": null}, {"name": "project_b_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/3ed6039747d94d479baf50af6c767d6f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "3ed6039747d94d479baf50af6c767d6f", "email": "admin_b@example.net", "password_expires_at": null}, {"name": "project_b_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/48e5540d59e4456dbabbc8555793e813"}, "domain_id": "default", "enabled": true, "options": {}, "id": "48e5540d59e4456dbabbc8555793e813", "email": "creator_b@example.net", "password_expires_at": null}, {"name": "project_b_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/8546bb44d02b4a11846e260d902431f7"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8546bb44d02b4a11846e260d902431f7", "email": "observer_b@example.net", "password_expires_at": null}, {"name": "project_b_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/220a6f918a8447848316ae5d0eb1f534"}, "domain_id": "default", "enabled": true, "options": {}, "id": "220a6f918a8447848316ae5d0eb1f534", "email": "auditor_b@example.net", "password_expires_at": null}, {"name": "juju_epc-user_64dbbf47-6096-48af-b335-651ad4c27a64", "links": {"self": "http://172.30.12.85/identity/v3/users/9436b1f8182740268995b89743a446fb"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "9436b1f8182740268995b89743a446fb", "domain_id": "default", "password_expires_at": null}, {"name": "patrole-user_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "links": {"self": "http://172.30.12.85/identity/v3/users/0f81613475b5401e8361e106ae9ab39e"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "0f81613475b5401e8361e106ae9ab39e", "domain_id": "default", "password_expires_at": null}, {"name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "domain_id": "default", "password_expires_at": null}], "links": {"self": "http://172.30.12.85/identity/v3/users?domain_id=default", "previous": null, "next": null}} 2020-02-21 20:06:59,498 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-b1dd039a-56a3-4068-9b9f-ba88b00a093e 2020-02-21 20:06:59,499 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.users in 0.08176255226135254s 2020-02-21 20:06:59,499 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-b1dd039a-56a3-4068-9b9f-ba88b00a093e 2020-02-21 20:06:59,513 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:06:59,515 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/projects?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,567 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 4673 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-1dd344c6-217c-40ae-a463-5343e615b52b 2020-02-21 20:06:59,567 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects?domain_id=default", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/b809462365774c4199739c1470056632"}, "tags": [], "enabled": true, "id": "b809462365774c4199739c1470056632", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_f2e95b71-7be0-4b0b-ad70-67491fc794e4"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}]} 2020-02-21 20:06:59,567 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-1dd344c6-217c-40ae-a463-5343e615b52b 2020-02-21 20:06:59,568 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.054888248443603516s 2020-02-21 20:06:59,568 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-1dd344c6-217c-40ae-a463-5343e615b52b 2020-02-21 20:06:59,576 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.role_assignments 2020-02-21 20:06:59,579 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/role_assignments?role.id=7f0816cbc4834584826cdd3049970cca&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,633 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 260 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-dff4b3ee-f0d9-4f20-a5f4-6a495de7fd3b 2020-02-21 20:06:59,634 - keystoneauth.session - DEBUG - RESP BODY: {"role_assignments": [], "links": {"self": "http://172.30.12.85/identity/v3/role_assignments?role.id=7f0816cbc4834584826cdd3049970cca&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d", "previous": null, "next": null}} 2020-02-21 20:06:59,634 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=7f0816cbc4834584826cdd3049970cca&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d used request id req-dff4b3ee-f0d9-4f20-a5f4-6a495de7fd3b 2020-02-21 20:06:59,634 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.role_assignments in 0.05806875228881836s 2020-02-21 20:06:59,634 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=7f0816cbc4834584826cdd3049970cca&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d used request id req-dff4b3ee-f0d9-4f20-a5f4-6a495de7fd3b 2020-02-21 20:06:59,639 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.PUT.projects.users.roles 2020-02-21 20:06:59,642 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/7f0816cbc4834584826cdd3049970cca -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,757 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-8039e44a-8414-4a4c-a52d-bfedffc922d6 2020-02-21 20:06:59,757 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:06:59,757 - keystoneauth.session - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/7f0816cbc4834584826cdd3049970cca used request id req-8039e44a-8414-4a4c-a52d-bfedffc922d6 2020-02-21 20:06:59,757 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.PUT.projects.users.roles in 0.11834549903869629s 2020-02-21 20:06:59,757 - shade.request_ids - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/7f0816cbc4834584826cdd3049970cca used request id req-8039e44a-8414-4a4c-a52d-bfedffc922d6 2020-02-21 20:06:59,759 - functest.core.tenantnetwork - DEBUG - cloud_config {'clouds': {'envvars': {'api_timeout': None, 'verify': True, 'cacert': None, 'cert': None, 'key': None, 'application_catalog_api_version': '1', 'auth_type': 'password', 'baremetal_api_version': '1', 'container_api_version': '1', 'container_infra_api_version': '1', 'compute_api_version': '2', 'database_api_version': '1.0', 'disable_vendor_agent': {}, 'dns_api_version': '2', 'interface': 'public', 'floating_ip_source': 'neutron', 'identity_api_version': '3', 'image_api_use_tasks': False, 'image_api_version': '2', 'image_format': 'qcow2', 'key_manager_api_version': 'v1', 'message': '', 'metering_api_version': '2', 'network_api_version': '2', 'object_store_api_version': '1', 'orchestration_api_version': '1', 'secgroup_source': 'neutron', 'status': 'active', 'volume_api_version': '2', 'workflow_api_version': '2', 'auth_url': 'http://172.30.12.85/identity/v3', 'project_name': 'neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'user_domain_name': 'Default', 'project_domain_name': 'Default', 'username': 'neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'password': 'Bf,4K[?ob5!f}AlNqF@N,nadxy_[iN', 'region_name': 'RegionOne', 'project_id': '3bb960f3511b4610bdd88acf066f912d'}}} 2020-02-21 20:06:59,766 - functest.core.tenantnetwork - DEBUG - new cloud {'auth_url': 'http://172.30.12.85/identity/v3', 'project_id': '3bb960f3511b4610bdd88acf066f912d', 'project_name': 'neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'project_domain_name': 'Default', 'username': 'neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'user_domain_name': 'Default', 'password': 'Bf,4K[?ob5!f}AlNqF@N,nadxy_[iN'} 2020-02-21 20:06:59,768 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:06:59,770 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,869 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-5577c608-489d-4b1b-b3eb-bea072a96f71 2020-02-21 20:06:59,874 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:06:59,874 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-5577c608-489d-4b1b-b3eb-bea072a96f71 2020-02-21 20:06:59,874 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.10596561431884766s 2020-02-21 20:06:59,875 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-5577c608-489d-4b1b-b3eb-bea072a96f71 2020-02-21 20:06:59,881 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:06:59,883 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,931 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-96ab8124-1913-4b53-b0da-e376db82e6ce 2020-02-21 20:06:59,931 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:06:59,931 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-96ab8124-1913-4b53-b0da-e376db82e6ce 2020-02-21 20:06:59,931 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.05013895034790039s 2020-02-21 20:06:59,931 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-96ab8124-1913-4b53-b0da-e376db82e6ce 2020-02-21 20:06:59,936 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.domains 2020-02-21 20:06:59,940 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/domains/default -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:06:59,980 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 200 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-fb5be1c7-465d-47f2-9b45-dbaaf8729662 2020-02-21 20:06:59,980 - keystoneauth.session - DEBUG - RESP BODY: {"domain": {"description": "The default domain", "links": {"self": "http://172.30.12.85/identity/v3/domains/default"}, "tags": [], "enabled": true, "options": {}, "id": "default", "name": "Default"}} 2020-02-21 20:06:59,980 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-fb5be1c7-465d-47f2-9b45-dbaaf8729662 2020-02-21 20:06:59,980 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.domains in 0.043897390365600586s 2020-02-21 20:06:59,981 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-fb5be1c7-465d-47f2-9b45-dbaaf8729662 2020-02-21 20:06:59,982 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.users 2020-02-21 20:06:59,985 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/users?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,052 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7807 Content-Type: application/json Date: Fri, 21 Feb 2020 20:06:59 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-8f19ea14-fc53-4c52-a67c-d72e237455cc 2020-02-21 20:07:00,053 - keystoneauth.session - DEBUG - RESP BODY: {"users": [{"password_expires_at": null, "name": "admin", "links": {"self": "http://172.30.12.85/identity/v3/users/b24f76739270471bb64eebf6e3646601"}, "domain_id": "default", "enabled": true, "id": "b24f76739270471bb64eebf6e3646601", "options": {}}, {"name": "demo", "links": {"self": "http://172.30.12.85/identity/v3/users/e16576aaf1ae4ca1a1768987d879beaf"}, "domain_id": "default", "enabled": true, "options": {}, "id": "e16576aaf1ae4ca1a1768987d879beaf", "email": "demo@example.com", "password_expires_at": null}, {"name": "alt_demo", "links": {"self": "http://172.30.12.85/identity/v3/users/8dd6688693b5400cb1045432f780a4d3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8dd6688693b5400cb1045432f780a4d3", "email": "alt_demo@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "nova", "links": {"self": "http://172.30.12.85/identity/v3/users/b0afe79fc7f54700a1679e7d8b885889"}, "domain_id": "default", "enabled": true, "id": "b0afe79fc7f54700a1679e7d8b885889", "options": {}}, {"password_expires_at": null, "name": "glance", "links": {"self": "http://172.30.12.85/identity/v3/users/68a178ee183746dcb0317b4e443e41cc"}, "domain_id": "default", "enabled": true, "id": "68a178ee183746dcb0317b4e443e41cc", "options": {}}, {"password_expires_at": null, "name": "glance-swift", "links": {"self": "http://172.30.12.85/identity/v3/users/cdc1aa602170452a96f907f4fa97b86f"}, "domain_id": "default", "enabled": true, "id": "cdc1aa602170452a96f907f4fa97b86f", "options": {}}, {"password_expires_at": null, "name": "cinder", "links": {"self": "http://172.30.12.85/identity/v3/users/c133842e0d5c4ac49a23a7da4363abd0"}, "domain_id": "default", "enabled": true, "id": "c133842e0d5c4ac49a23a7da4363abd0", "options": {}}, {"password_expires_at": null, "name": "neutron", "links": {"self": "http://172.30.12.85/identity/v3/users/973956b416c64ef2b57f493205a7bdd8"}, "domain_id": "default", "enabled": true, "id": "973956b416c64ef2b57f493205a7bdd8", "options": {}}, {"password_expires_at": null, "name": "swift", "links": {"self": "http://172.30.12.85/identity/v3/users/628e5f79587e412a96f6bc9753f9ffde"}, "domain_id": "default", "enabled": true, "id": "628e5f79587e412a96f6bc9753f9ffde", "options": {}}, {"name": "swiftusertest1", "links": {"self": "http://172.30.12.85/identity/v3/users/cc90d2b387964cb28dffa5da293ab9b3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cc90d2b387964cb28dffa5da293ab9b3", "email": "test@example.com", "password_expires_at": null}, {"name": "swiftusertest3", "links": {"self": "http://172.30.12.85/identity/v3/users/5e80a77ccabc42c792a8016d4f85308d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "5e80a77ccabc42c792a8016d4f85308d", "email": "test3@example.com", "password_expires_at": null}, {"name": "swiftusertest2", "links": {"self": "http://172.30.12.85/identity/v3/users/f6398227b24941bc9895461eca62b565"}, "domain_id": "default", "enabled": true, "options": {}, "id": "f6398227b24941bc9895461eca62b565", "email": "test2@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "placement", "links": {"self": "http://172.30.12.85/identity/v3/users/dabc1f359741415580e7e860a1cb44e1"}, "domain_id": "default", "enabled": true, "id": "dabc1f359741415580e7e860a1cb44e1", "options": {}}, {"password_expires_at": null, "name": "heat", "links": {"self": "http://172.30.12.85/identity/v3/users/40c676d7e781438785527e2ad13f9516"}, "domain_id": "default", "enabled": true, "id": "40c676d7e781438785527e2ad13f9516", "options": {}}, {"name": "barbican", "links": {"self": "http://172.30.12.85/identity/v3/users/0c600d0f83884bd79b6884495248ec12"}, "domain_id": "default", "enabled": true, "options": {}, "default_project_id": "e479343d5fff47bb96822a0889fa3366", "id": "0c600d0f83884bd79b6884495248ec12", "email": "barbican@example.com", "password_expires_at": null}, {"name": "service-admin", "links": {"self": "http://172.30.12.85/identity/v3/users/eb7c4303cff847d39b194ada83eed74d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "eb7c4303cff847d39b194ada83eed74d", "email": "service-admin@example.com", "password_expires_at": null}, {"name": "project_a_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/c501a9233eaf4ecebee0ddbbc8fc0605"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c501a9233eaf4ecebee0ddbbc8fc0605", "email": "admin_a@example.net", "password_expires_at": null}, {"name": "project_a_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/4c1f3b1f31ca4a2ab7e69329ba681b52"}, "domain_id": "default", "enabled": true, "options": {}, "id": "4c1f3b1f31ca4a2ab7e69329ba681b52", "email": "creator_a@example.net", "password_expires_at": null}, {"name": "project_a_creator_2", "links": {"self": "http://172.30.12.85/identity/v3/users/be811a0dfecb46dc8e4bf99962a1d264"}, "domain_id": "default", "enabled": true, "options": {}, "id": "be811a0dfecb46dc8e4bf99962a1d264", "email": "creator2_a@example.net", "password_expires_at": null}, {"name": "project_a_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/c48bb77a8869493f9fbba65147a19cf0"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c48bb77a8869493f9fbba65147a19cf0", "email": "observer_a@example.net", "password_expires_at": null}, {"name": "project_a_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/fdfcbb1acd984416972bf182b98eb4e5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "fdfcbb1acd984416972bf182b98eb4e5", "email": "auditor_a@example.net", "password_expires_at": null}, {"name": "project_b_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/3ed6039747d94d479baf50af6c767d6f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "3ed6039747d94d479baf50af6c767d6f", "email": "admin_b@example.net", "password_expires_at": null}, {"name": "project_b_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/48e5540d59e4456dbabbc8555793e813"}, "domain_id": "default", "enabled": true, "options": {}, "id": "48e5540d59e4456dbabbc8555793e813", "email": "creator_b@example.net", "password_expires_at": null}, {"name": "project_b_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/8546bb44d02b4a11846e260d902431f7"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8546bb44d02b4a11846e260d902431f7", "email": "observer_b@example.net", "password_expires_at": null}, {"name": "project_b_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/220a6f918a8447848316ae5d0eb1f534"}, "domain_id": "default", "enabled": true, "options": {}, "id": "220a6f918a8447848316ae5d0eb1f534", "email": "auditor_b@example.net", "password_expires_at": null}, {"name": "juju_epc-user_64dbbf47-6096-48af-b335-651ad4c27a64", "links": {"self": "http://172.30.12.85/identity/v3/users/9436b1f8182740268995b89743a446fb"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "9436b1f8182740268995b89743a446fb", "domain_id": "default", "password_expires_at": null}, {"name": "patrole-user_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "links": {"self": "http://172.30.12.85/identity/v3/users/0f81613475b5401e8361e106ae9ab39e"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "0f81613475b5401e8361e106ae9ab39e", "domain_id": "default", "password_expires_at": null}, {"name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "domain_id": "default", "password_expires_at": null}], "links": {"self": "http://172.30.12.85/identity/v3/users?domain_id=default", "previous": null, "next": null}} 2020-02-21 20:07:00,054 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-8f19ea14-fc53-4c52-a67c-d72e237455cc 2020-02-21 20:07:00,054 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.users in 0.0721747875213623s 2020-02-21 20:07:00,054 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-8f19ea14-fc53-4c52-a67c-d72e237455cc 2020-02-21 20:07:00,065 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:07:00,068 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/projects?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,124 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 4673 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-24dfdf3b-3e3e-4a67-b92e-05fd62d0c454 2020-02-21 20:07:00,124 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects?domain_id=default", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/b809462365774c4199739c1470056632"}, "tags": [], "enabled": true, "id": "b809462365774c4199739c1470056632", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_f2e95b71-7be0-4b0b-ad70-67491fc794e4"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}]} 2020-02-21 20:07:00,125 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-24dfdf3b-3e3e-4a67-b92e-05fd62d0c454 2020-02-21 20:07:00,125 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.05919361114501953s 2020-02-21 20:07:00,125 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-24dfdf3b-3e3e-4a67-b92e-05fd62d0c454 2020-02-21 20:07:00,132 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.role_assignments 2020-02-21 20:07:00,134 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,175 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 260 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-bbe69475-8729-41e4-b7fe-28871a892b20 2020-02-21 20:07:00,175 - keystoneauth.session - DEBUG - RESP BODY: {"role_assignments": [], "links": {"self": "http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d", "previous": null, "next": null}} 2020-02-21 20:07:00,175 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d used request id req-bbe69475-8729-41e4-b7fe-28871a892b20 2020-02-21 20:07:00,176 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.role_assignments in 0.04307365417480469s 2020-02-21 20:07:00,176 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.project.id=3bb960f3511b4610bdd88acf066f912d used request id req-bbe69475-8729-41e4-b7fe-28871a892b20 2020-02-21 20:07:00,179 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.PUT.projects.users.roles 2020-02-21 20:07:00,182 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,230 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-153b0a8e-0a2c-4cf4-9911-7632c375dbc2 2020-02-21 20:07:00,230 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:07:00,230 - keystoneauth.session - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f used request id req-153b0a8e-0a2c-4cf4-9911-7632c375dbc2 2020-02-21 20:07:00,230 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.PUT.projects.users.roles in 0.05122232437133789s 2020-02-21 20:07:00,230 - shade.request_ids - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f used request id req-153b0a8e-0a2c-4cf4-9911-7632c375dbc2 2020-02-21 20:07:00,234 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:07:00,237 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,327 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2456 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-ea34dd5c-f1bc-489c-9fd3-98ca0bb40f4d 2020-02-21 20:07:00,327 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:07:00,327 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-ea34dd5c-f1bc-489c-9fd3-98ca0bb40f4d 2020-02-21 20:07:00,327 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.0935826301574707s 2020-02-21 20:07:00,328 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-ea34dd5c-f1bc-489c-9fd3-98ca0bb40f4d 2020-02-21 20:07:00,331 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.domains 2020-02-21 20:07:00,333 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/domains/default -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,369 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 200 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-03c04576-fc29-4837-bf57-bfa3095f3491 2020-02-21 20:07:00,369 - keystoneauth.session - DEBUG - RESP BODY: {"domain": {"description": "The default domain", "links": {"self": "http://172.30.12.85/identity/v3/domains/default"}, "tags": [], "enabled": true, "options": {}, "id": "default", "name": "Default"}} 2020-02-21 20:07:00,369 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-03c04576-fc29-4837-bf57-bfa3095f3491 2020-02-21 20:07:00,369 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.domains in 0.03860759735107422s 2020-02-21 20:07:00,370 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains/default used request id req-03c04576-fc29-4837-bf57-bfa3095f3491 2020-02-21 20:07:00,371 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.users 2020-02-21 20:07:00,374 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/users?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,458 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7807 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-29f2768a-b765-4982-94a4-9c20e7dc66ce 2020-02-21 20:07:00,459 - keystoneauth.session - DEBUG - RESP BODY: {"users": [{"password_expires_at": null, "name": "admin", "links": {"self": "http://172.30.12.85/identity/v3/users/b24f76739270471bb64eebf6e3646601"}, "domain_id": "default", "enabled": true, "id": "b24f76739270471bb64eebf6e3646601", "options": {}}, {"name": "demo", "links": {"self": "http://172.30.12.85/identity/v3/users/e16576aaf1ae4ca1a1768987d879beaf"}, "domain_id": "default", "enabled": true, "options": {}, "id": "e16576aaf1ae4ca1a1768987d879beaf", "email": "demo@example.com", "password_expires_at": null}, {"name": "alt_demo", "links": {"self": "http://172.30.12.85/identity/v3/users/8dd6688693b5400cb1045432f780a4d3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8dd6688693b5400cb1045432f780a4d3", "email": "alt_demo@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "nova", "links": {"self": "http://172.30.12.85/identity/v3/users/b0afe79fc7f54700a1679e7d8b885889"}, "domain_id": "default", "enabled": true, "id": "b0afe79fc7f54700a1679e7d8b885889", "options": {}}, {"password_expires_at": null, "name": "glance", "links": {"self": "http://172.30.12.85/identity/v3/users/68a178ee183746dcb0317b4e443e41cc"}, "domain_id": "default", "enabled": true, "id": "68a178ee183746dcb0317b4e443e41cc", "options": {}}, {"password_expires_at": null, "name": "glance-swift", "links": {"self": "http://172.30.12.85/identity/v3/users/cdc1aa602170452a96f907f4fa97b86f"}, "domain_id": "default", "enabled": true, "id": "cdc1aa602170452a96f907f4fa97b86f", "options": {}}, {"password_expires_at": null, "name": "cinder", "links": {"self": "http://172.30.12.85/identity/v3/users/c133842e0d5c4ac49a23a7da4363abd0"}, "domain_id": "default", "enabled": true, "id": "c133842e0d5c4ac49a23a7da4363abd0", "options": {}}, {"password_expires_at": null, "name": "neutron", "links": {"self": "http://172.30.12.85/identity/v3/users/973956b416c64ef2b57f493205a7bdd8"}, "domain_id": "default", "enabled": true, "id": "973956b416c64ef2b57f493205a7bdd8", "options": {}}, {"password_expires_at": null, "name": "swift", "links": {"self": "http://172.30.12.85/identity/v3/users/628e5f79587e412a96f6bc9753f9ffde"}, "domain_id": "default", "enabled": true, "id": "628e5f79587e412a96f6bc9753f9ffde", "options": {}}, {"name": "swiftusertest1", "links": {"self": "http://172.30.12.85/identity/v3/users/cc90d2b387964cb28dffa5da293ab9b3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cc90d2b387964cb28dffa5da293ab9b3", "email": "test@example.com", "password_expires_at": null}, {"name": "swiftusertest3", "links": {"self": "http://172.30.12.85/identity/v3/users/5e80a77ccabc42c792a8016d4f85308d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "5e80a77ccabc42c792a8016d4f85308d", "email": "test3@example.com", "password_expires_at": null}, {"name": "swiftusertest2", "links": {"self": "http://172.30.12.85/identity/v3/users/f6398227b24941bc9895461eca62b565"}, "domain_id": "default", "enabled": true, "options": {}, "id": "f6398227b24941bc9895461eca62b565", "email": "test2@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "placement", "links": {"self": "http://172.30.12.85/identity/v3/users/dabc1f359741415580e7e860a1cb44e1"}, "domain_id": "default", "enabled": true, "id": "dabc1f359741415580e7e860a1cb44e1", "options": {}}, {"password_expires_at": null, "name": "heat", "links": {"self": "http://172.30.12.85/identity/v3/users/40c676d7e781438785527e2ad13f9516"}, "domain_id": "default", "enabled": true, "id": "40c676d7e781438785527e2ad13f9516", "options": {}}, {"name": "barbican", "links": {"self": "http://172.30.12.85/identity/v3/users/0c600d0f83884bd79b6884495248ec12"}, "domain_id": "default", "enabled": true, "options": {}, "default_project_id": "e479343d5fff47bb96822a0889fa3366", "id": "0c600d0f83884bd79b6884495248ec12", "email": "barbican@example.com", "password_expires_at": null}, {"name": "service-admin", "links": {"self": "http://172.30.12.85/identity/v3/users/eb7c4303cff847d39b194ada83eed74d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "eb7c4303cff847d39b194ada83eed74d", "email": "service-admin@example.com", "password_expires_at": null}, {"name": "project_a_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/c501a9233eaf4ecebee0ddbbc8fc0605"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c501a9233eaf4ecebee0ddbbc8fc0605", "email": "admin_a@example.net", "password_expires_at": null}, {"name": "project_a_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/4c1f3b1f31ca4a2ab7e69329ba681b52"}, "domain_id": "default", "enabled": true, "options": {}, "id": "4c1f3b1f31ca4a2ab7e69329ba681b52", "email": "creator_a@example.net", "password_expires_at": null}, {"name": "project_a_creator_2", "links": {"self": "http://172.30.12.85/identity/v3/users/be811a0dfecb46dc8e4bf99962a1d264"}, "domain_id": "default", "enabled": true, "options": {}, "id": "be811a0dfecb46dc8e4bf99962a1d264", "email": "creator2_a@example.net", "password_expires_at": null}, {"name": "project_a_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/c48bb77a8869493f9fbba65147a19cf0"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c48bb77a8869493f9fbba65147a19cf0", "email": "observer_a@example.net", "password_expires_at": null}, {"name": "project_a_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/fdfcbb1acd984416972bf182b98eb4e5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "fdfcbb1acd984416972bf182b98eb4e5", "email": "auditor_a@example.net", "password_expires_at": null}, {"name": "project_b_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/3ed6039747d94d479baf50af6c767d6f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "3ed6039747d94d479baf50af6c767d6f", "email": "admin_b@example.net", "password_expires_at": null}, {"name": "project_b_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/48e5540d59e4456dbabbc8555793e813"}, "domain_id": "default", "enabled": true, "options": {}, "id": "48e5540d59e4456dbabbc8555793e813", "email": "creator_b@example.net", "password_expires_at": null}, {"name": "project_b_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/8546bb44d02b4a11846e260d902431f7"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8546bb44d02b4a11846e260d902431f7", "email": "observer_b@example.net", "password_expires_at": null}, {"name": "project_b_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/220a6f918a8447848316ae5d0eb1f534"}, "domain_id": "default", "enabled": true, "options": {}, "id": "220a6f918a8447848316ae5d0eb1f534", "email": "auditor_b@example.net", "password_expires_at": null}, {"name": "juju_epc-user_64dbbf47-6096-48af-b335-651ad4c27a64", "links": {"self": "http://172.30.12.85/identity/v3/users/9436b1f8182740268995b89743a446fb"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "9436b1f8182740268995b89743a446fb", "domain_id": "default", "password_expires_at": null}, {"name": "patrole-user_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "links": {"self": "http://172.30.12.85/identity/v3/users/0f81613475b5401e8361e106ae9ab39e"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "0f81613475b5401e8361e106ae9ab39e", "domain_id": "default", "password_expires_at": null}, {"name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "domain_id": "default", "password_expires_at": null}], "links": {"self": "http://172.30.12.85/identity/v3/users?domain_id=default", "previous": null, "next": null}} 2020-02-21 20:07:00,459 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-29f2768a-b765-4982-94a4-9c20e7dc66ce 2020-02-21 20:07:00,459 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.users in 0.08809733390808105s 2020-02-21 20:07:00,459 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users?domain_id=default used request id req-29f2768a-b765-4982-94a4-9c20e7dc66ce 2020-02-21 20:07:00,472 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.role_assignments 2020-02-21 20:07:00,475 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.domain.id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,519 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 234 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-287e5e1e-ec42-4e75-b819-e145bdbe9ff0 2020-02-21 20:07:00,519 - keystoneauth.session - DEBUG - RESP BODY: {"role_assignments": [], "links": {"self": "http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.domain.id=default", "previous": null, "next": null}} 2020-02-21 20:07:00,519 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.domain.id=default used request id req-287e5e1e-ec42-4e75-b819-e145bdbe9ff0 2020-02-21 20:07:00,520 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.role_assignments in 0.04700827598571777s 2020-02-21 20:07:00,520 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/role_assignments?role.id=fdaf27b046a444febc27b149904b994f&user.id=e98031d447fe4df7acb26a58a9646e4d&scope.domain.id=default used request id req-287e5e1e-ec42-4e75-b819-e145bdbe9ff0 2020-02-21 20:07:00,523 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.PUT.domains.users.roles 2020-02-21 20:07:00,526 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85/identity/v3/domains/default/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:00,652 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-f1a82a51-d73b-4261-b1c3-7947a8aca2aa 2020-02-21 20:07:00,652 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:07:00,652 - keystoneauth.session - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/domains/default/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f used request id req-f1a82a51-d73b-4261-b1c3-7947a8aca2aa 2020-02-21 20:07:00,652 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.PUT.domains.users.roles in 0.1293346881866455s 2020-02-21 20:07:00,653 - shade.request_ids - DEBUG - PUT call to identity for http://172.30.12.85/identity/v3/domains/default/users/e98031d447fe4df7acb26a58a9646e4d/roles/fdaf27b046a444febc27b149904b994f used request id req-f1a82a51-d73b-4261-b1c3-7947a8aca2aa 2020-02-21 20:07:00,660 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3 -H "Accept: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" 2020-02-21 20:07:00,671 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 256 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3fd12c14-bf91-4e20-b651-3f79b4a04997 2020-02-21 20:07:00,671 - keystoneauth.session - DEBUG - RESP BODY: {"version": {"status": "stable", "updated": "2019-07-19T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.13", "links": [{"href": "http://172.30.12.85/identity/v3/", "rel": "self"}]}} 2020-02-21 20:07:00,671 - keystoneauth.session - DEBUG - GET call to http://172.30.12.85/identity/v3 used request id req-3fd12c14-bf91-4e20-b651-3f79b4a04997 2020-02-21 20:07:00,672 - keystoneauth.identity.v3.base - DEBUG - Making authentication request to http://172.30.12.85/identity/v3/auth/tokens 2020-02-21 20:07:00,793 - keystoneauth.identity.v3.base - DEBUG - {"token": {"is_domain": false, "methods": ["password"], "roles": [{"id": "163d5d16a01d43c3bf579e79818c43ff", "name": "reader"}, {"id": "7f0816cbc4834584826cdd3049970cca", "name": "member"}, {"id": "fdaf27b046a444febc27b149904b994f", "name": "admin"}], "expires_at": "2020-02-21T21:07:00.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "3bb960f3511b4610bdd88acf066f912d", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, "catalog": [{"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api-cfn/v1", "region": "RegionOne", "interface": "internal", "id": "143c25f3c7024dfa961f47a8ebd5777e"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api-cfn/v1", "region": "RegionOne", "interface": "admin", "id": "90eb7f2154574cbf98089313ab62455c"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api-cfn/v1", "region": "RegionOne", "interface": "public", "id": "9f9b73b2a469472fbecf17f12e5609ca"}], "type": "cloudformation", "id": "193b2cc1e33741bc9b319e1ba234998c", "name": "heat-cfn"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/placement", "region": "RegionOne", "interface": "public", "id": "b1210e35c01b46b1ab567895e5a60f69"}], "type": "placement", "id": "3bbaf5638ffb4e81ba79b7aaf651c9cb", "name": "placement"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/volume/v3/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "7c53a84423214a24adb68a97aa3ed746"}], "type": "volumev3", "id": "41bdc1adf58546ec996f6d886ac0fb39", "name": "cinderv3"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/image", "region": "RegionOne", "interface": "public", "id": "32809a03d41e45228607caa47d91b1b9"}], "type": "image", "id": "4443c6dd64554f6fadf6fe903b2dde37", "name": "glance"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api/v1/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "internal", "id": "3066dfd0ba844206b2178264c81ebbd8"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api/v1/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "b2f5057867334f14b2ed801b5045f560"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/heat-api/v1/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "admin", "id": "c7e318982e464437b59b532657adea6f"}], "type": "orchestration", "id": "4e4ec70109e0489293df3dd48c64a0ce", "name": "heat"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/volume/v2/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "cf604e22b17a4f34910cda7115880057"}], "type": "volumev2", "id": "6767c456260a4ee59d6da3befe497a1c", "name": "cinderv2"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85:9696/", "region": "RegionOne", "interface": "public", "id": "7c56ff288c83469d87e95a66013b4b89"}], "type": "network", "id": "6d73608e9394412495c3b3656656d2f0", "name": "neutron"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/identity", "region": "RegionOne", "interface": "admin", "id": "76cf0885fa234870b38271eb24c91e07"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/identity", "region": "RegionOne", "interface": "public", "id": "b3963ef213834210bb5531b239e82cca"}], "type": "identity", "id": "7599561d05e947f3996e4ea2936a97d1", "name": "keystone"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/volume/v3/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "6aa8408d105d40c8a6f0d5dd59ed7491"}], "type": "block-storage", "id": "75f83a219d824db9ac915e82ae02bc34", "name": "cinder"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/compute/v2/3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "a7397cc23b4c4c378845098590337214"}], "type": "compute_legacy", "id": "a56834275f134853aa8b121915646821", "name": "nova_legacy"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85:8080", "region": "RegionOne", "interface": "public", "id": "3942df8794c14310818ff279a07fade9"}, {"region_id": "RegionOne", "url": "http://172.30.12.85:8080", "region": "RegionOne", "interface": "admin", "id": "76c980c075cc407781a0170b8dc39986"}, {"region_id": "RegionOne", "url": "http://172.30.12.85:8080", "region": "RegionOne", "interface": "internal", "id": "e9fb70db9d474144a375bfc5f8bf0a19"}], "type": "s3", "id": "a7af79443d0b4c739b9900f3a2928e29", "name": "s3"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/key-manager", "region": "RegionOne", "interface": "internal", "id": "0db709cab44f4d25b9164c252b829876"}, {"region_id": "RegionOne", "url": "http://172.30.12.85/key-manager", "region": "RegionOne", "interface": "public", "id": "bc5b98a24c06406ca488789ea34ac3ef"}], "type": "key-manager", "id": "bfc58c99be2e43acaa46ad49bb30313b", "name": "barbican"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85/compute/v2.1", "region": "RegionOne", "interface": "public", "id": "6eefbbba1c134fc3b5d00245e4eeb7cd"}], "type": "compute", "id": "f066c584e6f54f49b761bb56e594aea8", "name": "nova"}, {"endpoints": [{"region_id": "RegionOne", "url": "http://172.30.12.85:8080", "region": "RegionOne", "interface": "admin", "id": "0693e96bd28f4245a684f46016eb58ba"}, {"region_id": "RegionOne", "url": "http://172.30.12.85:8080/v1/AUTH_3bb960f3511b4610bdd88acf066f912d", "region": "RegionOne", "interface": "public", "id": "92c9a5b97aae4c2ab57c541ae0166a53"}], "type": "object-store", "id": "f08bac0b28824ff9b49f90f51c1996fb", "name": "swift"}], "user": {"password_expires_at": null, "domain": {"id": "default", "name": "Default"}, "id": "e98031d447fe4df7acb26a58a9646e4d", "name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, "audit_ids": ["gZhtkwLcQMyix5h1KPrWqQ"], "issued_at": "2020-02-21T20:07:00.000000Z"}} 2020-02-21 20:07:00,797 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.extensions 2020-02-21 20:07:00,797 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/extensions.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:00,996 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 12471 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:00 GMT X-Openstack-Request-Id: req-6400206c-9928-407b-8e3a-a63c94162bda 2020-02-21 20:07:00,997 - keystoneauth.session - DEBUG - RESP BODY: {"extensions": [{"alias": "subnetpool-prefix-ops", "updated": "2019-02-08T10:00:00-00:00", "name": "Subnet Pool Prefix Operations", "links": [], "description": "Provides support for adjusting the prefix list of subnet pools"}, {"alias": "default-subnetpools", "updated": "2016-02-18T18:00:00-00:00", "name": "Default Subnetpools", "links": [], "description": "Provides ability to mark and use a subnetpool as the default."}, {"alias": "qos", "updated": "2015-06-08T10:00:00-00:00", "name": "Quality of Service", "links": [], "description": "The Quality of Service extension."}, {"alias": "availability_zone", "updated": "2015-01-01T10:00:00-00:00", "name": "Availability Zone", "links": [], "description": "The availability zone extension."}, {"alias": "network_availability_zone", "updated": "2015-01-01T10:00:00-00:00", "name": "Network Availability Zone", "links": [], "description": "Availability zone support for network."}, {"alias": "subnet_onboard", "updated": "2018-12-18T09:00:00-00:00", "name": "Subnet Onboard", "links": [], "description": "Provides support for onboarding subnets into subnet pools"}, {"alias": "auto-allocated-topology", "updated": "2016-01-01T00:00:00-00:00", "name": "Auto Allocated Topology Services", "links": [], "description": "Auto Allocated Topology Services."}, {"alias": "ext-gw-mode", "updated": "2013-03-28T10:00:00-00:00", "name": "Neutron L3 Configurable external gateway mode", "links": [], "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway"}, {"alias": "binding", "updated": "2014-02-03T10:00:00-00:00", "name": "Port Binding", "links": [], "description": "Expose port bindings of a virtual port to external application"}, {"alias": "agent", "updated": "2013-02-03T10:00:00-00:00", "name": "agent", "links": [], "description": "The agent management extension."}, {"alias": "rbac-security-groups", "updated": "2019-02-14T00:00:00-00:00", "name": "Add security_group type to network RBAC", "links": [], "description": "Add security_group type to network RBAC"}, {"alias": "subnet_allocation", "updated": "2015-03-30T10:00:00-00:00", "name": "Subnet Allocation", "links": [], "description": "Enables allocation of subnets from a subnet pool"}, {"alias": "dhcp_agent_scheduler", "updated": "2013-02-07T10:00:00-00:00", "name": "DHCP Agent Scheduler", "links": [], "description": "Schedule networks among dhcp agents"}, {"alias": "trunk-details", "updated": "2016-01-01T10:00:00-00:00", "name": "Trunk port details", "links": [], "description": "Expose trunk port details"}, {"alias": "dns-domain-ports", "updated": "2017-04-24T10:00:00-00:00", "name": "dns_domain for ports", "links": [], "description": "Allows the DNS domain to be specified for a network port."}, {"alias": "address-scope", "updated": "2015-07-26T10:00:00-00:00", "name": "Address scope", "links": [], "description": "Address scopes extension."}, {"alias": "external-net", "updated": "2013-01-14T10:00:00-00:00", "name": "Neutron external network", "links": [], "description": "Adds external network attribute to network resource."}, {"alias": "empty-string-filtering", "updated": "2018-05-01T10:00:00-00:00", "name": "Empty String Filtering Extension", "links": [], "description": "Allow filtering by attributes with empty string value"}, {"alias": "flavors", "updated": "2015-09-17T10:00:00-00:00", "name": "Neutron Service Flavors", "links": [], "description": "Flavor specification for Neutron advanced services."}, {"alias": "segment", "updated": "2016-02-24T17:00:00-00:00", "name": "Segment", "links": [], "description": "Segments extension."}, {"alias": "net-mtu", "updated": "2015-03-25T10:00:00-00:00", "name": "Network MTU", "links": [], "description": "Provides MTU attribute for a network resource."}, {"alias": "dns-integration", "updated": "2015-08-15T18:00:00-00:00", "name": "DNS Integration", "links": [], "description": "Provides integration with DNS."}, {"alias": "qos-default", "updated": "2017-041-06T10:00:00-00:00", "name": "QoS default policy", "links": [], "description": "Expose the QoS default policy per project"}, {"alias": "quotas", "updated": "2012-07-29T10:00:00-00:00", "name": "Quota management support", "links": [], "description": "Expose functions for quotas management per tenant"}, {"alias": "standard-attr-tag", "updated": "2017-01-01T00:00:00-00:00", "name": "Tag support for resources with standard attribute: subnet, trunk, network_segment_range, router, network, policy, subnetpool, port, security_group, floatingip", "links": [], "description": "Enables to set tag on resources with standard attribute."}, {"alias": "availability_zone_filter", "updated": "2018-06-22T10:00:00-00:00", "name": "Availability Zone Filter Extension", "links": [], "description": "Add filter parameters to AvailabilityZone resource"}, {"alias": "revision-if-match", "updated": "2016-12-11T00:00:00-00:00", "name": "If-Match constraints based on revision_number", "links": [], "description": "Extension indicating that If-Match based on revision_number is supported."}, {"alias": "provider", "updated": "2012-09-07T10:00:00-00:00", "name": "Provider Network", "links": [], "description": "Expose mapping of virtual networks to physical networks"}, {"alias": "subnet-segmentid-writable", "updated": "2018-03-12T00:00:00-00:00", "name": "Subnet SegmentID (writable)", "links": [], "description": "Provides a writable segment_id attribute for a subnet resource."}, {"alias": "multi-provider", "updated": "2013-06-27T10:00:00-00:00", "name": "Multi Provider Network", "links": [], "description": "Expose mapping of virtual networks to multiple physical networks"}, {"alias": "quota_details", "updated": "2017-02-10T10:00:00-00:00", "name": "Quota details management support", "links": [], "description": "Expose functions for quotas usage statistics per project"}, {"alias": "l2_adjacency", "updated": "2016-04-12T16:00:00-00:00", "name": "L2 Adjacency", "links": [], "description": "Display L2 Adjacency for Neutron Networks."}, {"alias": "trunk", "updated": "2016-01-01T10:00:00-00:00", "name": "Trunk Extension", "links": [], "description": "Provides support for trunk ports"}, {"alias": "extraroute", "updated": "2013-02-01T10:00:00-00:00", "name": "Neutron Extra Route", "links": [], "description": "Extra routes configuration for L3 router"}, {"alias": "net-mtu-writable", "updated": "2017-07-12T00:00:00-00:00", "name": "Network MTU (writable)", "links": [], "description": "Provides a writable MTU attribute for a network resource."}, {"alias": "agent-resources-synced", "updated": "2018-12-19T00:00:00-00:00", "name": "Agent's Resource View Synced to Placement", "links": [], "description": "Stores success/failure of last sync to Placement"}, {"alias": "subnet-service-types", "updated": "2016-03-15T18:00:00-00:00", "name": "Subnet service types", "links": [], "description": "Provides ability to set the subnet service_types field"}, {"alias": "port-mac-address-regenerate", "updated": "2018-05-03T10:00:00-00:00", "name": "Neutron Port MAC address regenerate", "links": [], "description": "Network port MAC address regenerate"}, {"alias": "port-resource-request", "updated": "2018-05-08T10:00:00-00:00", "name": "Port Resource Request", "links": [], "description": "Expose resource request to Port"}, {"alias": "service-type", "updated": "2013-01-20T00:00:00-00:00", "name": "Neutron Service Type Management", "links": [], "description": "API for retrieving service providers for Neutron advanced services"}, {"alias": "qos-rule-type-details", "updated": "2017-06-22T10:00:00-00:00", "name": "Details of QoS rule types", "links": [], "description": "Expose details about QoS rule types supported by loaded backend drivers"}, {"alias": "port-security", "updated": "2012-07-23T10:00:00-00:00", "name": "Port Security", "links": [], "description": "Provides port security"}, {"alias": "standard-attr-segment", "updated": "2018-04-09T10:00:00-00:00", "name": "Standard Attribute Segment Extension", "links": [], "description": "Add standard attributes to Segment resource"}, {"alias": "qos-bw-minimum-ingress", "updated": "2018-07-09T10:00:00-00:00", "name": "Ingress direction for QoS minimum bandwidth rule", "links": [], "description": "Allow to configure QoS minumum bandwidth rule with ingress direction."}, {"alias": "extra_dhcp_opt", "updated": "2013-03-17T12:00:00-00:00", "name": "Neutron Extra DHCP options", "links": [], "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)"}, {"alias": "port-security-groups-filtering", "updated": "2018-01-09T09:00:00-00:00", "name": "Port filtering on security groups", "links": [], "description": "Provides security groups filtering when listing ports"}, {"alias": "standard-attr-timestamp", "updated": "2016-09-12T10:00:00-00:00", "name": "Resource timestamps", "links": [], "description": "Adds created_at and updated_at fields to all Neutron resources that have Neutron standard attributes."}, {"alias": "standard-attr-revisions", "updated": "2016-04-11T10:00:00-00:00", "name": "Resource revision numbers", "links": [], "description": "This extension will display the revision number of neutron resources."}, {"alias": "pagination", "updated": "2016-06-12T00:00:00-00:00", "name": "Pagination support", "links": [], "description": "Extension that indicates that pagination is enabled."}, {"alias": "sorting", "updated": "2016-06-12T00:00:00-00:00", "name": "Sorting support", "links": [], "description": "Extension that indicates that sorting is enabled."}, {"alias": "logging", "updated": "2017-01-01T10:00:00-00:00", "name": "Logging API Extension", "links": [], "description": "Provides a logging API for resources such as security group and firewall."}, {"alias": "segments-peer-subnet-host-routes", "updated": "2018-06-12T10:00:00-00:00", "name": "Segments peer-subnet host routes", "links": [], "description": "Add host routes to subnets on a routed network (segments)"}, {"alias": "security-group", "updated": "2012-10-05T10:00:00-00:00", "name": "security-group", "links": [], "description": "The security groups extension."}, {"alias": "network-ip-availability", "updated": "2015-09-24T00:00:00-00:00", "name": "Network IP Availability", "links": [], "description": "Provides IP availability data for each network and subnet."}, {"alias": "qos-rules-alias", "updated": "2018-10-07T10:00:00-00:00", "name": "Quality of Service rules alias API", "links": [], "description": "API to enable GET, PUT and DELETE operations on QoS policy rules without specifying policy ID"}, {"alias": "rbac-policies", "updated": "2015-06-17T12:15:12-00:00", "name": "RBAC Policies", "links": [], "description": "Allows creation and modification of policies that control tenant access to resources."}, {"alias": "project-id", "updated": "2016-09-09T09:09:09-09:09", "name": "project_id field enabled", "links": [], "description": "Extension that indicates that project_id field is enabled."}, {"alias": "qos-bw-limit-direction", "updated": "2017-04-10T10:00:00-00:00", "name": "Direction for QoS bandwidth limit rule", "links": [], "description": "Allow to configure QoS bandwidth limit rule with specific direction: ingress or egress"}, {"alias": "standard-attr-description", "updated": "2016-02-10T10:00:00-00:00", "name": "standard-attr-description", "links": [], "description": "Extension to add descriptions to standard attributes"}, {"alias": "ip-substring-filtering", "updated": "2017-11-28T09:00:00-00:00", "name": "IP address substring filtering", "links": [], "description": "Provides IP address substring filtering when listing ports"}, {"alias": "router", "updated": "2012-07-20T10:00:00-00:00", "name": "Neutron L3 Router", "links": [], "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway."}, {"alias": "allowed-address-pairs", "updated": "2013-07-23T10:00:00-00:00", "name": "Allowed Address Pairs", "links": [], "description": "Provides allowed address pairs"}, {"alias": "ip_allocation", "updated": "2016-06-10T23:00:00-00:00", "name": "IP Allocation", "links": [], "description": "IP allocation extension."}, {"alias": "binding-extended", "updated": "2017-07-17T10:00:00-00:00", "name": "Port Bindings Extended", "links": [], "description": "Expose port bindings of a virtual port to external application"}]} 2020-02-21 20:07:00,998 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/extensions.json used request id req-6400206c-9928-407b-8e3a-a63c94162bda 2020-02-21 20:07:00,998 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.extensions in 0.2009892463684082s 2020-02-21 20:07:00,998 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/extensions.json used request id req-6400206c-9928-407b-8e3a-a63c94162bda 2020-02-21 20:07:01,006 - xtesting.ci.run_tests - INFO - Running test case 'neutron_trunk'... 2020-02-21 20:07:01,006 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.domains 2020-02-21 20:07:01,009 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/domains -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:01,130 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 811 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:01 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-c63f41da-9ea2-4122-b889-438632d4177b 2020-02-21 20:07:01,130 - keystoneauth.session - DEBUG - RESP BODY: {"domains": [{"description": "Used for swift functional testing", "links": {"self": "http://172.30.12.85/identity/v3/domains/a44f5c1830f344f79a8e1106566b695b"}, "tags": [], "enabled": true, "options": {}, "id": "a44f5c1830f344f79a8e1106566b695b", "name": "swift_test"}, {"description": "The default domain", "links": {"self": "http://172.30.12.85/identity/v3/domains/default"}, "tags": [], "enabled": true, "options": {}, "id": "default", "name": "Default"}, {"description": "Owns users and projects created by heat", "links": {"self": "http://172.30.12.85/identity/v3/domains/e9cfe98ff983445dabaabfd0b0395735"}, "tags": [], "enabled": true, "options": {}, "id": "e9cfe98ff983445dabaabfd0b0395735", "name": "heat"}], "links": {"self": "http://172.30.12.85/identity/v3/domains", "previous": null, "next": null}} 2020-02-21 20:07:01,130 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains used request id req-c63f41da-9ea2-4122-b889-438632d4177b 2020-02-21 20:07:01,131 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.domains in 0.12422895431518555s 2020-02-21 20:07:01,131 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/domains used request id req-c63f41da-9ea2-4122-b889-438632d4177b 2020-02-21 20:07:01,137 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:07:01,140 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/identity/v3/projects?domain_id=default" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:01,187 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 4673 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:01 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-ebc9990f-4187-4093-96af-a55c15eed720 2020-02-21 20:07:01,187 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects?domain_id=default", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/b809462365774c4199739c1470056632"}, "tags": [], "enabled": true, "id": "b809462365774c4199739c1470056632", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_f2e95b71-7be0-4b0b-ad70-67491fc794e4"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}]} 2020-02-21 20:07:01,187 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-ebc9990f-4187-4093-96af-a55c15eed720 2020-02-21 20:07:01,188 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.05025124549865723s 2020-02-21 20:07:01,188 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects?domain_id=default used request id req-ebc9990f-4187-4093-96af-a55c15eed720 2020-02-21 20:07:01,191 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.POST.networks 2020-02-21 20:07:01,191 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85:9696/v2.0/networks.json -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"network": {"name": "neutron_trunk-net_f7f9587f-7171-4f18-8f05-6b1018bd5139", "admin_state_up": true, "shared": true, "tenant_id": "3bb960f3511b4610bdd88acf066f912d"}}' 2020-02-21 20:07:02,247 - keystoneauth.session - DEBUG - RESP: [201] Connection: keep-alive Content-Length: 743 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:02 GMT X-Openstack-Request-Id: req-0d08c14c-fdd3-48fd-bcea-195c656134a2 2020-02-21 20:07:02,247 - keystoneauth.session - DEBUG - RESP BODY: {"network":{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":1,"port_security_enabled":true,"provider:network_type":"geneve","id":"fe7d03fe-398e-46c9-85e2-e9fb811d6d0e","router:external":false,"availability_zone_hints":[],"availability_zones":[],"qos_policy_id":null,"ipv4_address_scope":null,"shared":true,"project_id":"3bb960f3511b4610bdd88acf066f912d","l2_adjacency":true,"status":"ACTIVE","subnets":[],"description":"","tags":[],"updated_at":"2020-02-21T20:07:01Z","is_default":false,"provider:segmentation_id":63,"name":"neutron_trunk-net_f7f9587f-7171-4f18-8f05-6b1018bd5139","admin_state_up":true,"tenant_id":"3bb960f3511b4610bdd88acf066f912d","created_at":"2020-02-21T20:07:01Z","mtu":1342}} 2020-02-21 20:07:02,247 - keystoneauth.session - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-0d08c14c-fdd3-48fd-bcea-195c656134a2 2020-02-21 20:07:02,248 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.POST.networks in 1.0567338466644287s 2020-02-21 20:07:02,248 - shade.request_ids - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-0d08c14c-fdd3-48fd-bcea-195c656134a2 2020-02-21 20:07:02,248 - functest.core.tenantnetwork - DEBUG - network: Munch({'provider:physical_network': None, 'ipv6_address_scope': None, 'dns_domain': '', 'revision_number': 1, 'port_security_enabled': True, 'provider:network_type': 'geneve', 'id': 'fe7d03fe-398e-46c9-85e2-e9fb811d6d0e', 'router:external': False, 'availability_zone_hints': [], 'availability_zones': [], 'qos_policy_id': None, 'ipv4_address_scope': None, 'shared': True, 'project_id': '3bb960f3511b4610bdd88acf066f912d', 'l2_adjacency': True, 'status': 'ACTIVE', 'subnets': [], 'description': '', 'tags': [], 'updated_at': '2020-02-21T20:07:01Z', 'is_default': False, 'provider:segmentation_id': 63, 'name': 'neutron_trunk-net_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'admin_state_up': True, 'tenant_id': '3bb960f3511b4610bdd88acf066f912d', 'created_at': '2020-02-21T20:07:01Z', 'mtu': 1342}) 2020-02-21 20:07:02,249 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.networks 2020-02-21 20:07:02,250 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/networks.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:02,395 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 4434 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:02 GMT X-Openstack-Request-Id: req-189d697b-317c-44c3-9a70-651f1d3d0cf0 2020-02-21 20:07:02,395 - keystoneauth.session - DEBUG - RESP BODY: {"networks":[{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"1b7ba01f-6e3e-4ac6-a61d-ebcfd5a77a2a","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":54,"ipv4_address_scope":null,"shared":true,"project_id":"b809462365774c4199739c1470056632","l2_adjacency":true,"status":"ACTIVE","subnets":["28a37c98-2485-4cfc-857b-60f7e4bdbc05"],"description":"","tags":[],"updated_at":"2020-02-21T20:06:13Z","qos_policy_id":null,"name":"patrole-net_f2e95b71-7be0-4b0b-ad70-67491fc794e4","admin_state_up":true,"tenant_id":"b809462365774c4199739c1470056632","created_at":"2020-02-21T20:06:12Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"3b453d58-0aed-4c70-97c5-3134a69941d7","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":23,"ipv4_address_scope":null,"shared":false,"project_id":"89f0296fc0c0431e81c8370bb90781d7","l2_adjacency":true,"status":"ACTIVE","subnets":["68b51c78-1b8d-4682-a3b8-55f7c1e3d924"],"description":"","tags":[],"updated_at":"2020-02-21T18:58:04Z","qos_policy_id":null,"name":"juju_epc-net_64dbbf47-6096-48af-b335-651ad4c27a64","admin_state_up":true,"tenant_id":"89f0296fc0c0431e81c8370bb90781d7","created_at":"2020-02-21T18:58:03Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"84c32ecd-4489-48c9-ab07-0424f59a9334","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":96,"ipv4_address_scope":null,"shared":true,"project_id":"457b822374de45b5a7624827c06b5ff5","l2_adjacency":true,"status":"ACTIVE","subnets":["01f41653-ecbf-4ced-adb8-b13008abdf4e"],"description":"","tags":[],"updated_at":"2020-02-21T01:03:31Z","qos_policy_id":null,"name":"shared","admin_state_up":true,"tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T01:03:28Z","provider:network_type":"geneve"},{"provider:physical_network":"public","updated_at":"2020-02-21T01:18:39Z","dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1400,"id":"cc73a4a8-eda0-4345-b031-0faf5535ddc1","router:external":true,"availability_zone_hints":[],"availability_zones":[],"name":"public","ipv4_address_scope":null,"shared":false,"project_id":"457b822374de45b5a7624827c06b5ff5","l2_adjacency":true,"status":"ACTIVE","subnets":["32f6c915-45c6-4b3e-a816-f9e5eef96759","b8bece0a-ddbb-4741-b7ca-cf139e335f8e"],"description":"gman","tags":[],"ipv6_address_scope":null,"is_default":true,"provider:segmentation_id":null,"qos_policy_id":null,"admin_state_up":true,"tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T00:59:53Z","provider:network_type":"flat"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1342,"id":"f23a5d51-77fd-4071-b570-cce4f4876686","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":84,"ipv4_address_scope":null,"shared":false,"project_id":"3a550fb8c83e4161886059d8b8d86710","l2_adjacency":true,"status":"ACTIVE","subnets":["722806d3-4529-467c-8873-928b2e24fdd8","36da8052-dadc-4d65-bda8-84398147b1ed"],"description":"","tags":[],"updated_at":"2020-02-21T00:59:40Z","qos_policy_id":null,"name":"private","admin_state_up":true,"tenant_id":"3a550fb8c83e4161886059d8b8d86710","created_at":"2020-02-21T00:59:32Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":1,"port_security_enabled":true,"mtu":1342,"id":"fe7d03fe-398e-46c9-85e2-e9fb811d6d0e","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":63,"ipv4_address_scope":null,"shared":true,"project_id":"3bb960f3511b4610bdd88acf066f912d","l2_adjacency":true,"status":"ACTIVE","subnets":[],"description":"","tags":[],"updated_at":"2020-02-21T20:07:01Z","qos_policy_id":null,"name":"neutron_trunk-net_f7f9587f-7171-4f18-8f05-6b1018bd5139","admin_state_up":true,"tenant_id":"3bb960f3511b4610bdd88acf066f912d","created_at":"2020-02-21T20:07:01Z","provider:network_type":"geneve"}]} 2020-02-21 20:07:02,396 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-189d697b-317c-44c3-9a70-651f1d3d0cf0 2020-02-21 20:07:02,396 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.networks in 0.14667344093322754s 2020-02-21 20:07:02,396 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-189d697b-317c-44c3-9a70-651f1d3d0cf0 2020-02-21 20:07:02,399 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.POST.subnets 2020-02-21 20:07:02,399 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85:9696/v2.0/subnets.json -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"subnet": {"network_id": "fe7d03fe-398e-46c9-85e2-e9fb811d6d0e", "ip_version": 4, "enable_dhcp": true, "cidr": "192.168.120.0/24", "name": "neutron_trunk-subnet_f7f9587f-7171-4f18-8f05-6b1018bd5139", "dns_nameservers": ["8.8.8.8"]}}' 2020-02-21 20:07:04,009 - keystoneauth.session - DEBUG - RESP: [201] Connection: keep-alive Content-Length: 699 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:04 GMT X-Openstack-Request-Id: req-8830c038-232a-406b-b5cd-67e10500bcb5 2020-02-21 20:07:04,009 - keystoneauth.session - DEBUG - RESP BODY: {"subnet":{"updated_at":"2020-02-21T20:07:02Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"fb3f8f76-88be-4fbe-b787-c76ef6e428c7","dns_nameservers":["8.8.8.8"],"gateway_ip":"192.168.120.1","project_id":"3bb960f3511b4610bdd88acf066f912d","description":"","tags":[],"cidr":"192.168.120.0/24","subnetpool_id":null,"service_types":[],"name":"neutron_trunk-subnet_f7f9587f-7171-4f18-8f05-6b1018bd5139","enable_dhcp":true,"segment_id":null,"network_id":"fe7d03fe-398e-46c9-85e2-e9fb811d6d0e","tenant_id":"3bb960f3511b4610bdd88acf066f912d","created_at":"2020-02-21T20:07:02Z","ip_version":4}} 2020-02-21 20:07:04,009 - keystoneauth.session - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/subnets.json used request id req-8830c038-232a-406b-b5cd-67e10500bcb5 2020-02-21 20:07:04,010 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.POST.subnets in 1.61082124710083s 2020-02-21 20:07:04,010 - shade.request_ids - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/subnets.json used request id req-8830c038-232a-406b-b5cd-67e10500bcb5 2020-02-21 20:07:04,010 - functest.core.tenantnetwork - DEBUG - subnet: Munch({'updated_at': '2020-02-21T20:07:02Z', 'ipv6_ra_mode': None, 'allocation_pools': [{'start': '192.168.120.2', 'end': '192.168.120.254'}], 'host_routes': [], 'revision_number': 0, 'ipv6_address_mode': None, 'id': 'fb3f8f76-88be-4fbe-b787-c76ef6e428c7', 'dns_nameservers': ['8.8.8.8'], 'gateway_ip': '192.168.120.1', 'project_id': '3bb960f3511b4610bdd88acf066f912d', 'description': '', 'tags': [], 'cidr': '192.168.120.0/24', 'subnetpool_id': None, 'service_types': [], 'name': 'neutron_trunk-subnet_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'enable_dhcp': True, 'segment_id': None, 'network_id': 'fe7d03fe-398e-46c9-85e2-e9fb811d6d0e', 'tenant_id': '3bb960f3511b4610bdd88acf066f912d', 'created_at': '2020-02-21T20:07:02Z', 'ip_version': 4}) 2020-02-21 20:07:04,011 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.POST.routers 2020-02-21 20:07:04,011 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85:9696/v2.0/routers.json -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"router": {"admin_state_up": true, "name": "neutron_trunk-router_f7f9587f-7171-4f18-8f05-6b1018bd5139", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1"}}}' 2020-02-21 20:07:06,210 - keystoneauth.session - DEBUG - RESP: [201] Connection: keep-alive Content-Length: 709 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:06 GMT X-Openstack-Request-Id: req-c241ec52-7717-4448-88dd-747e3620b3bf 2020-02-21 20:07:06,211 - keystoneauth.session - DEBUG - RESP BODY: {"router": {"status": "ACTIVE", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "32f6c915-45c6-4b3e-a816-f9e5eef96759", "ip_address": "172.24.4.162"}, {"subnet_id": "b8bece0a-ddbb-4741-b7ca-cf139e335f8e", "ip_address": "2001:db8::96"}]}, "description": "", "tags": [], "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "created_at": "2020-02-21T20:07:04Z", "admin_state_up": true, "updated_at": "2020-02-21T20:07:05Z", "revision_number": 2, "routes": [], "project_id": "3bb960f3511b4610bdd88acf066f912d", "id": "219b52b2-95dd-4d32-8f74-7b0be6e7e58d", "name": "neutron_trunk-router_f7f9587f-7171-4f18-8f05-6b1018bd5139"}} 2020-02-21 20:07:06,211 - keystoneauth.session - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/routers.json used request id req-c241ec52-7717-4448-88dd-747e3620b3bf 2020-02-21 20:07:06,211 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.POST.routers in 2.200207471847534s 2020-02-21 20:07:06,212 - shade.request_ids - DEBUG - POST call to network for http://172.30.12.85:9696/v2.0/routers.json used request id req-c241ec52-7717-4448-88dd-747e3620b3bf 2020-02-21 20:07:06,212 - functest.core.tenantnetwork - DEBUG - router: Munch({'status': 'ACTIVE', 'external_gateway_info': {'network_id': 'cc73a4a8-eda0-4345-b031-0faf5535ddc1', 'enable_snat': True, 'external_fixed_ips': [{'subnet_id': '32f6c915-45c6-4b3e-a816-f9e5eef96759', 'ip_address': '172.24.4.162'}, {'subnet_id': 'b8bece0a-ddbb-4741-b7ca-cf139e335f8e', 'ip_address': '2001:db8::96'}]}, 'description': '', 'tags': [], 'tenant_id': '3bb960f3511b4610bdd88acf066f912d', 'created_at': '2020-02-21T20:07:04Z', 'admin_state_up': True, 'updated_at': '2020-02-21T20:07:05Z', 'revision_number': 2, 'routes': [], 'project_id': '3bb960f3511b4610bdd88acf066f912d', 'id': '219b52b2-95dd-4d32-8f74-7b0be6e7e58d', 'name': 'neutron_trunk-router_f7f9587f-7171-4f18-8f05-6b1018bd5139'}) 2020-02-21 20:07:06,212 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.PUT.routers.add_router_interface 2020-02-21 20:07:06,213 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/add_router_interface.json -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"subnet_id": "fb3f8f76-88be-4fbe-b787-c76ef6e428c7"}' 2020-02-21 20:07:09,030 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 309 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT X-Openstack-Request-Id: req-4bb9f913-360c-4741-aa65-74d8077b9f21 2020-02-21 20:07:09,030 - keystoneauth.session - DEBUG - RESP BODY: {"network_id": "fe7d03fe-398e-46c9-85e2-e9fb811d6d0e", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "subnet_id": "fb3f8f76-88be-4fbe-b787-c76ef6e428c7", "subnet_ids": ["fb3f8f76-88be-4fbe-b787-c76ef6e428c7"], "port_id": "da734f8f-3f6d-4366-8fc2-3cb59b6a9ba5", "id": "219b52b2-95dd-4d32-8f74-7b0be6e7e58d"} 2020-02-21 20:07:09,030 - keystoneauth.session - DEBUG - PUT call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/add_router_interface.json used request id req-4bb9f913-360c-4741-aa65-74d8077b9f21 2020-02-21 20:07:09,031 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.PUT.routers.add_router_interface in 2.8181676864624023s 2020-02-21 20:07:09,031 - shade.request_ids - DEBUG - PUT call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/add_router_interface.json used request id req-4bb9f913-360c-4741-aa65-74d8077b9f21 returning object 219b52b2-95dd-4d32-8f74-7b0be6e7e58d 2020-02-21 20:07:09,031 - shade - DEBUG - Calculating hashes for /home/opnfv/functest/images/cirros-0.4.0-x86_64-disk.img 2020-02-21 20:07:09,103 - shade - DEBUG - Image file /home/opnfv/functest/images/cirros-0.4.0-x86_64-disk.img md5:443b7623e27ecf03dc9e01ee93f67afe sha256:a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8 2020-02-21 20:07:09,107 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image -H "Accept: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" 2020-02-21 20:07:09,118 - keystoneauth.session - DEBUG - RESP: [300] Connection: close Content-Length: 984 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT Server: Apache/2.4.29 (Ubuntu) 2020-02-21 20:07:09,118 - keystoneauth.session - DEBUG - RESP BODY: {"versions": [{"status": "CURRENT", "id": "v2.9", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.7", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.6", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.5", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.4", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.3", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.2", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.1", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}, {"status": "SUPPORTED", "id": "v2.0", "links": [{"href": "http://172.30.12.85/image/v2/", "rel": "self"}]}]} 2020-02-21 20:07:09,123 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.GET.images 2020-02-21 20:07:09,127 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image/v2/images -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:09,178 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 5991 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-52853a3b-45ff-45c0-b0ba-39e395bae208 2020-02-21 20:07:09,179 - keystoneauth.session - DEBUG - RESP BODY: {"images": [{"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:51Z", "file": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/file", "owner": "b809462365774c4199739c1470056632", "id": "328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "size": 12716032, "self": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:51Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:22Z", "file": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/file", "owner": "b809462365774c4199739c1470056632", "id": "be97ddff-c952-4909-91a7-58e3ca4f18d6", "size": 12716032, "self": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:21Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "71c7e3e7-79cb-4427-b592-b9ad56664f37", "size": 264897024, "self": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "3c4ad0defbe729dd3c16d2851d775575d1c5351c85734418d3b89bfdfd28ebd1", "updated_at": "2020-02-21T18:58:28Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "72eec501d849cb834c8da0b21b295c66", "name": "juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "72eec501d849cb834c8da0b21b295c66", "created_at": "2020-02-21T18:58:24Z", "os_hidden": false, "protected": false, "os_hash_value": "68a5054c2588605e779c131589ecf7a737a71b856a31c0e2fd97c1026ad97cf7371ab5e431cf3519f0a924238cc05cc11e27a2a317967c118774020976808d6d"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "e77771b0-6a39-4681-8e79-ee30ccd2db49", "size": 297140224, "self": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "070af1947c6df473d8ebd3d649c29a694236521df2f29c77626aba4b907847c4", "updated_at": "2020-02-21T18:58:20Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "548da32032c62ddc55e3cfcbe7d2c278", "name": "juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "548da32032c62ddc55e3cfcbe7d2c278", "created_at": "2020-02-21T18:58:16Z", "os_hidden": false, "protected": false, "os_hash_value": "4fc9fb3c0c561cd1f732f85159b7188a9ef823c921f1eb6bc1dc39d9d71d57e10c005bbb20ce0eb92ebed51956e4f3396762cf49708c0bb965b6c554ade1879e"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T00:58:58Z", "file": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/file", "owner": "457b822374de45b5a7624827c06b5ff5", "id": "39314c02-c40c-4670-9cb2-fab681f3ccd5", "size": 12716032, "self": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "visibility": "public", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/snap", "metadata": {}}], "min_disk": 0, "virtual_size": null, "name": "cirros-0.4.0-x86_64-disk", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T00:58:56Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}], "schema": "/v2/schemas/images", "first": "/v2/images"} 2020-02-21 20:07:09,179 - keystoneauth.session - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-52853a3b-45ff-45c0-b0ba-39e395bae208 2020-02-21 20:07:09,179 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.GET.images in 0.0559847354888916s 2020-02-21 20:07:09,180 - shade.request_ids - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-52853a3b-45ff-45c0-b0ba-39e395bae208 2020-02-21 20:07:09,193 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.POST.images 2020-02-21 20:07:09,196 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/image/v2/images -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"disk_format": "qcow2", "container_format": "bare", "visibility": "public", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139"}' 2020-02-21 20:07:09,259 - keystoneauth.session - DEBUG - RESP: [201] Connection: close Content-Length: 997 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT Location: http://127.0.0.1:60999/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56 OpenStack-image-import-methods: glance-direct,web-download Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-080c6bc9-fede-4277-abd0-ae3cd1cca5e0 2020-02-21 20:07:09,260 - keystoneauth.session - DEBUG - RESP BODY: {"container_format": "bare", "min_ram": 0, "locations": [], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "size": null, "self": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "disk_format": "qcow2", "os_hash_algo": null, "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "queued", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:09Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": null, "created_at": "2020-02-21T20:07:09Z", "os_hidden": false, "protected": false, "os_hash_value": null} 2020-02-21 20:07:09,260 - keystoneauth.session - DEBUG - POST call to image for http://172.30.12.85/image/v2/images used request id req-080c6bc9-fede-4277-abd0-ae3cd1cca5e0 2020-02-21 20:07:09,260 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.POST.images in 0.06663298606872559s 2020-02-21 20:07:09,260 - shade.request_ids - DEBUG - POST call to image for http://172.30.12.85/image/v2/images used request id req-080c6bc9-fede-4277-abd0-ae3cd1cca5e0 returning object c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56 2020-02-21 20:07:09,261 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.PUT.images.file 2020-02-21 20:07:09,265 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file -H "Content-Type: application/octet-stream" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '<_io.BufferedReader name='/home/opnfv/functest/images/cirros-0.4.0-x86_64-disk.img'>' 2020-02-21 20:07:09,673 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Content-Type: text/html; charset=UTF-8 Date: Fri, 21 Feb 2020 20:07:09 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-2d1ece83-d40a-4ee4-9323-e51735adeb3e 2020-02-21 20:07:09,673 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2020-02-21 20:07:09,673 - keystoneauth.session - DEBUG - PUT call to image for http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file used request id req-2d1ece83-d40a-4ee4-9323-e51735adeb3e 2020-02-21 20:07:09,673 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.PUT.images.file in 0.41252923011779785s 2020-02-21 20:07:09,674 - shade.request_ids - DEBUG - PUT call to image for http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file used request id req-2d1ece83-d40a-4ee4-9323-e51735adeb3e 2020-02-21 20:07:09,678 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.GET.images 2020-02-21 20:07:09,683 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image/v2/images -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:09,913 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7272 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-4e8767f9-ba17-4f56-8eef-df52a5592136 2020-02-21 20:07:09,914 - keystoneauth.session - DEBUG - RESP BODY: {"images": [{"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "size": 12716032, "self": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:10Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:07:09Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:51Z", "file": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/file", "owner": "b809462365774c4199739c1470056632", "id": "328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "size": 12716032, "self": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:51Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:22Z", "file": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/file", "owner": "b809462365774c4199739c1470056632", "id": "be97ddff-c952-4909-91a7-58e3ca4f18d6", "size": 12716032, "self": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:21Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "71c7e3e7-79cb-4427-b592-b9ad56664f37", "size": 264897024, "self": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "3c4ad0defbe729dd3c16d2851d775575d1c5351c85734418d3b89bfdfd28ebd1", "updated_at": "2020-02-21T18:58:28Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "72eec501d849cb834c8da0b21b295c66", "name": "juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "72eec501d849cb834c8da0b21b295c66", "created_at": "2020-02-21T18:58:24Z", "os_hidden": false, "protected": false, "os_hash_value": "68a5054c2588605e779c131589ecf7a737a71b856a31c0e2fd97c1026ad97cf7371ab5e431cf3519f0a924238cc05cc11e27a2a317967c118774020976808d6d"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "e77771b0-6a39-4681-8e79-ee30ccd2db49", "size": 297140224, "self": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "070af1947c6df473d8ebd3d649c29a694236521df2f29c77626aba4b907847c4", "updated_at": "2020-02-21T18:58:20Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "548da32032c62ddc55e3cfcbe7d2c278", "name": "juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "548da32032c62ddc55e3cfcbe7d2c278", "created_at": "2020-02-21T18:58:16Z", "os_hidden": false, "protected": false, "os_hash_value": "4fc9fb3c0c561cd1f732f85159b7188a9ef823c921f1eb6bc1dc39d9d71d57e10c005bbb20ce0eb92ebed51956e4f3396762cf49708c0bb965b6c554ade1879e"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T00:58:58Z", "file": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/file", "owner": "457b822374de45b5a7624827c06b5ff5", "id": "39314c02-c40c-4670-9cb2-fab681f3ccd5", "size": 12716032, "self": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "visibility": "public", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/snap", "metadata": {}}], "min_disk": 0, "virtual_size": null, "name": "cirros-0.4.0-x86_64-disk", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T00:58:56Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}], "schema": "/v2/schemas/images", "first": "/v2/images"} 2020-02-21 20:07:09,914 - keystoneauth.session - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-4e8767f9-ba17-4f56-8eef-df52a5592136 2020-02-21 20:07:09,914 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.GET.images in 0.23550200462341309s 2020-02-21 20:07:09,914 - shade.request_ids - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-4e8767f9-ba17-4f56-8eef-df52a5592136 2020-02-21 20:07:09,917 - functest.core.singlevm - DEBUG - image: Munch({'location': Munch({'cloud': 'envvars', 'region_name': 'RegionOne', 'zone': None, 'project': Munch({'id': '3bb960f3511b4610bdd88acf066f912d', 'name': 'neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'domain_id': None, 'domain_name': 'Default'})}), 'created_at': '2020-02-21T20:07:09Z', 'updated_at': '2020-02-21T20:07:10Z', 'checksum': '443b7623e27ecf03dc9e01ee93f67afe', 'container_format': 'bare', 'direct_url': None, 'disk_format': 'qcow2', 'file': '/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file', 'id': 'c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56', 'name': 'neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner': '3bb960f3511b4610bdd88acf066f912d', 'tags': [], 'status': 'active', 'min_ram': 0, 'min_disk': 0, 'size': 12716032, 'virtual_size': 0, 'is_protected': False, 'locations': [Munch({'url': 'rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/snap', 'metadata': Munch({})})], 'properties': {'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78'}, 'is_public': True, 'visibility': 'public', 'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78', 'protected': False, 'metadata': {'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78'}, 'created': '2020-02-21T20:07:09Z', 'updated': '2020-02-21T20:07:10Z', 'minDisk': 0, 'minRam': 0}) 2020-02-21 20:07:09,919 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.POST.flavors 2020-02-21 20:07:09,921 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/compute/v2.1/flavors -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"flavor": {"disk": 1, "OS-FLV-EXT-DATA:ephemeral": 0, "id": null, "os-flavor-access:is_public": true, "name": "neutron_trunk-flavor_f7f9587f-7171-4f18-8f05-6b1018bd5139", "ram": 512, "rxtx_factor": 1.0, "swap": 0, "vcpus": 1}}' 2020-02-21 20:07:09,986 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 519 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-ed64e3a8-0591-4c83-8fca-924e57d2fcdd x-openstack-request-id: req-ed64e3a8-0591-4c83-8fca-924e57d2fcdd 2020-02-21 20:07:09,987 - keystoneauth.session - DEBUG - RESP BODY: {"flavor": {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "76049132-d7c1-4cdc-a038-90bff8ac53db", "name": "neutron_trunk-flavor_f7f9587f-7171-4f18-8f05-6b1018bd5139", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2020-02-21 20:07:09,987 - keystoneauth.session - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors used request id req-ed64e3a8-0591-4c83-8fca-924e57d2fcdd 2020-02-21 20:07:09,987 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.POST.flavors in 0.0674281120300293s 2020-02-21 20:07:09,987 - shade.request_ids - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors used request id req-ed64e3a8-0591-4c83-8fca-924e57d2fcdd 2020-02-21 20:07:09,988 - functest.core.singlevm - DEBUG - flavor: Munch({'location': Munch({'cloud': 'envvars', 'region_name': 'RegionOne', 'zone': None, 'project': Munch({'id': '3a550fb8c83e4161886059d8b8d86710', 'name': 'demo', 'domain_id': None, 'domain_name': 'Default'})}), 'id': '76049132-d7c1-4cdc-a038-90bff8ac53db', 'name': 'neutron_trunk-flavor_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'is_public': True, 'is_disabled': False, 'ram': 512, 'vcpus': 1, 'disk': 1, 'ephemeral': 0, 'swap': 0, 'rxtx_factor': 1.0, 'properties': Munch({'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}), 'extra_specs': Munch({}), 'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}) 2020-02-21 20:07:09,989 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.POST.flavors.os-extra_specs 2020-02-21 20:07:09,992 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db/os-extra_specs -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"extra_specs": {}}' 2020-02-21 20:07:10,031 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 19 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:09 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-d744907c-9454-4fb3-8813-f7f0174fdbd3 x-openstack-request-id: req-d744907c-9454-4fb3-8813-f7f0174fdbd3 2020-02-21 20:07:10,031 - keystoneauth.session - DEBUG - RESP BODY: {"extra_specs": {}} 2020-02-21 20:07:10,031 - keystoneauth.session - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db/os-extra_specs used request id req-d744907c-9454-4fb3-8813-f7f0174fdbd3 2020-02-21 20:07:10,031 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.POST.flavors.os-extra_specs in 0.04253101348876953s 2020-02-21 20:07:10,032 - shade.request_ids - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db/os-extra_specs used request id req-d744907c-9454-4fb3-8813-f7f0174fdbd3 2020-02-21 20:07:10,040 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity -H "Accept: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" 2020-02-21 20:07:10,048 - keystoneauth.session - DEBUG - RESP: [300] Connection: close Content-Length: 271 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:10 GMT Location: http://172.30.12.85/identity/v3/ Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-86e21d31-d3a1-46a2-90ad-1fcac327e32d 2020-02-21 20:07:10,049 - keystoneauth.session - DEBUG - RESP BODY: {"versions": {"values": [{"status": "stable", "updated": "2019-07-19T00:00:00Z", "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}], "id": "v3.13", "links": [{"href": "http://172.30.12.85/identity/v3/", "rel": "self"}]}]}} 2020-02-21 20:07:10,049 - keystoneauth.session - DEBUG - GET call to http://172.30.12.85/identity used request id req-86e21d31-d3a1-46a2-90ad-1fcac327e32d 2020-02-21 20:07:10,052 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:07:10,054 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:10,146 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2676 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:10 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-432af6cc-d8dc-485b-b059-fa8a7c576ca4 2020-02-21 20:07:10,147 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/73571228b8cd4455999e536122ea63fb"}, "options": {}, "id": "73571228b8cd4455999e536122ea63fb", "domain_id": null, "name": "heat_stack_owner"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:07:10,147 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-432af6cc-d8dc-485b-b059-fa8a7c576ca4 2020-02-21 20:07:10,147 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.0955815315246582s 2020-02-21 20:07:10,148 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-432af6cc-d8dc-485b-b059-fa8a7c576ca4 2020-02-21 20:07:10,154 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.roles 2020-02-21 20:07:10,157 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/roles -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:10,208 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 2676 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:10 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-17cc95b3-a590-4e0d-aa8d-5aa8bd177349 2020-02-21 20:07:10,209 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/roles", "previous": null, "next": null}, "roles": [{"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/02bef01893ea4772bf943e1b32a0c936"}, "options": {}, "id": "02bef01893ea4772bf943e1b32a0c936", "domain_id": null, "name": "service"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/0b4a255130cf4623b82df0c21ebf2f62"}, "options": {}, "id": "0b4a255130cf4623b82df0c21ebf2f62", "domain_id": null, "name": "ResellerAdmin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/163d5d16a01d43c3bf579e79818c43ff"}, "options": {}, "id": "163d5d16a01d43c3bf579e79818c43ff", "domain_id": null, "name": "reader"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/42eb24a6bfdb47378a15d5a598b770ca"}, "options": {}, "id": "42eb24a6bfdb47378a15d5a598b770ca", "domain_id": null, "name": "heat_stack_user"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/4319dda25d5348b6bca1b252badbd1b5"}, "options": {}, "id": "4319dda25d5348b6bca1b252badbd1b5", "domain_id": null, "name": "creator"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/6efc236a66a34b3a8936701f043b9959"}, "options": {}, "id": "6efc236a66a34b3a8936701f043b9959", "domain_id": null, "name": "observer"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/73571228b8cd4455999e536122ea63fb"}, "options": {}, "id": "73571228b8cd4455999e536122ea63fb", "domain_id": null, "name": "heat_stack_owner"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/7f0816cbc4834584826cdd3049970cca"}, "options": {}, "id": "7f0816cbc4834584826cdd3049970cca", "domain_id": null, "name": "member"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/9a9d86ad4e5b4539b0dd0ef1fe6e28f9"}, "options": {}, "id": "9a9d86ad4e5b4539b0dd0ef1fe6e28f9", "domain_id": null, "name": "anotherrole"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/d1453628d8d2401dbff102004d1bbd07"}, "options": {}, "id": "d1453628d8d2401dbff102004d1bbd07", "domain_id": null, "name": "key-manager:service-admin"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/ec8f2ed4b5bc4bfc954784abe3c327e2"}, "options": {}, "id": "ec8f2ed4b5bc4bfc954784abe3c327e2", "domain_id": null, "name": "audit"}, {"description": null, "links": {"self": "http://172.30.12.85/identity/v3/roles/fdaf27b046a444febc27b149904b994f"}, "options": {}, "id": "fdaf27b046a444febc27b149904b994f", "domain_id": null, "name": "admin"}]} 2020-02-21 20:07:10,209 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-17cc95b3-a590-4e0d-aa8d-5aa8bd177349 2020-02-21 20:07:10,210 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.roles in 0.055815935134887695s 2020-02-21 20:07:10,210 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/roles used request id req-17cc95b3-a590-4e0d-aa8d-5aa8bd177349 2020-02-21 20:07:10,216 - functest.opnfv_tests.openstack.rally.rally - INFO - Creating Rally environment... 2020-02-21 20:07:22,980 - functest.opnfv_tests.openstack.rally.rally - INFO - rally deployment create --fromenv --name opnfv-rally +--------------------------------------+----------------------------+-------------+------------------+--------+ | uuid | created_at | name | status | active | +--------------------------------------+----------------------------+-------------+------------------+--------+ | e9d50b47-9538-464e-bfee-0bc99e60cc28 | 2020-02-21T20:07:22.491724 | opnfv-rally | deploy->finished | | +--------------------------------------+----------------------------+-------------+------------------+--------+ Using deployment: e9d50b47-9538-464e-bfee-0bc99e60cc28 ~/.rally/openrc was updated HINTS: * To use standard OpenStack clients, set up your env by running: source ~/.rally/openrc OpenStack clients are now configured, e.g run: openstack image list 2020-02-21 20:07:28,386 - functest.opnfv_tests.openstack.rally.rally - INFO - rally deployment check -------------------------------------------------------------------------------- Platform openstack: -------------------------------------------------------------------------------- Available services: +-------------+----------------+-----------+ | Service | Service Type | Status | +-------------+----------------+-----------+ | __unknown__ | compute_legacy | Available | | __unknown__ | placement | Available | | barbican | key-manager | Available | | cinder | block-storage | Available | | cinder | volumev2 | Available | | cinder | volumev3 | Available | | cloud | cloudformation | Available | | glance | image | Available | | heat | orchestration | Available | | keystone | identity | Available | | neutron | network | Available | | nova | compute | Available | | s3 | s3 | Available | | swift | object-store | Available | +-------------+----------------+-----------+ 2020-02-21 20:07:30,022 - functest.opnfv_tests.openstack.tempest.tempest - INFO - Create verifier from existing repo... 2020-02-21 20:07:39,434 - functest.opnfv_tests.openstack.tempest.tempest - INFO - rally verify create-verifier --source /src/tempest --name opnfv-tempest --type tempest --system-wide Using verifier 'opnfv-tempest' (UUID=86d619a5-8992-4c6a-a71f-c3dba7649bc9) as the default verifier for the future CLI operations. 2020-02-21 20:07:43,430 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.GET.os-hypervisors.detail 2020-02-21 20:07:43,435 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/compute/v2.1/os-hypervisors/detail -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:07:43,512 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 3062 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:43 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-df3c2228-5d65-4a14-afd3-dedfc2f71fad x-openstack-request-id: req-df3c2228-5d65-4a14-afd3-dedfc2f71fad 2020-02-21 20:07:43,513 - keystoneauth.session - DEBUG - RESP BODY: {"hypervisors": [{"status": "enabled", "service": {"host": "pod4-node2", "disabled_reason": null, "id": 3}, "vcpus_used": 4, "hypervisor_type": "QEMU", "local_gb_used": 40, "vcpus": 88, "hypervisor_hostname": "pod4-node2", "memory_mb_used": 12800, "memory_mb": 64312, "current_workload": 0, "state": "up", "host_ip": "172.30.12.85", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Broadwell-IBRS\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"rtm\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"smap\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"hle\", \"smep\", \"ssse3\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"adx\", \"3dnowprefetch\", \"nx\", \"fxsr\", \"syscall\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"cx16\", \"pcid\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"md-clear\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"acpi\", \"spec-ctrl\", \"fpu\", \"ssbd\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"x2apic\", \"rdseed\"], \"topology\": {\"cores\": 22, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 4, "free_disk_gb": 59, "hypervisor_version": 2011001, "disk_available_least": 79, "local_gb": 99, "free_ram_mb": 51512, "id": 1}, {"status": "enabled", "service": {"host": "pod4-node3", "disabled_reason": null, "id": 4}, "vcpus_used": 1, "hypervisor_type": "QEMU", "local_gb_used": 10, "vcpus": 88, "hypervisor_hostname": "pod4-node3", "memory_mb_used": 2560, "memory_mb": 64312, "current_workload": 0, "state": "up", "host_ip": "172.30.12.86", "cpu_info": "{\"vendor\": \"Intel\", \"model\": \"Broadwell-IBRS\", \"arch\": \"x86_64\", \"features\": [\"pge\", \"avx\", \"xsaveopt\", \"clflush\", \"sep\", \"rtm\", \"tsc_adjust\", \"tsc-deadline\", \"dtes64\", \"invpcid\", \"tsc\", \"fsgsbase\", \"xsave\", \"smap\", \"vmx\", \"erms\", \"xtpr\", \"cmov\", \"hle\", \"smep\", \"ssse3\", \"est\", \"pat\", \"monitor\", \"smx\", \"pbe\", \"lm\", \"msr\", \"adx\", \"3dnowprefetch\", \"nx\", \"fxsr\", \"syscall\", \"tm\", \"sse4.1\", \"pae\", \"sse4.2\", \"pclmuldq\", \"cx16\", \"pcid\", \"fma\", \"vme\", \"popcnt\", \"mmx\", \"osxsave\", \"cx8\", \"mce\", \"de\", \"rdtscp\", \"ht\", \"dca\", \"lahf_lm\", \"abm\", \"md-clear\", \"pdcm\", \"mca\", \"pdpe1gb\", \"apic\", \"sse\", \"f16c\", \"pse\", \"ds\", \"invtsc\", \"pni\", \"tm2\", \"avx2\", \"aes\", \"sse2\", \"ss\", \"ds_cpl\", \"arat\", \"bmi1\", \"bmi2\", \"acpi\", \"spec-ctrl\", \"fpu\", \"ssbd\", \"pse36\", \"mtrr\", \"movbe\", \"rdrand\", \"x2apic\", \"rdseed\"], \"topology\": {\"cores\": 22, \"cells\": 2, \"threads\": 2, \"sockets\": 1}}", "running_vms": 1, "free_disk_gb": 89, "hypervisor_version": 2011001, "disk_available_least": 79, "local_gb": 99, "free_ram_mb": 61752, "id": 2}]} 2020-02-21 20:07:43,513 - keystoneauth.session - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/os-hypervisors/detail used request id req-df3c2228-5d65-4a14-afd3-dedfc2f71fad 2020-02-21 20:07:43,513 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.GET.os-hypervisors.detail in 0.08258390426635742s 2020-02-21 20:07:43,514 - shade.request_ids - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/os-hypervisors/detail used request id req-df3c2228-5d65-4a14-afd3-dedfc2f71fad 2020-02-21 20:07:43,517 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.GET.images 2020-02-21 20:07:43,519 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image/v2/images -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:43,563 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7272 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:43 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-556561f4-33c6-4ba9-ac42-b4867f4c5d2f 2020-02-21 20:07:43,564 - keystoneauth.session - DEBUG - RESP BODY: {"images": [{"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "size": 12716032, "self": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:10Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:07:09Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:51Z", "file": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/file", "owner": "b809462365774c4199739c1470056632", "id": "328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "size": 12716032, "self": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:51Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:22Z", "file": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/file", "owner": "b809462365774c4199739c1470056632", "id": "be97ddff-c952-4909-91a7-58e3ca4f18d6", "size": 12716032, "self": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:21Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "71c7e3e7-79cb-4427-b592-b9ad56664f37", "size": 264897024, "self": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "3c4ad0defbe729dd3c16d2851d775575d1c5351c85734418d3b89bfdfd28ebd1", "updated_at": "2020-02-21T18:58:28Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "72eec501d849cb834c8da0b21b295c66", "name": "juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "72eec501d849cb834c8da0b21b295c66", "created_at": "2020-02-21T18:58:24Z", "os_hidden": false, "protected": false, "os_hash_value": "68a5054c2588605e779c131589ecf7a737a71b856a31c0e2fd97c1026ad97cf7371ab5e431cf3519f0a924238cc05cc11e27a2a317967c118774020976808d6d"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "e77771b0-6a39-4681-8e79-ee30ccd2db49", "size": 297140224, "self": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "070af1947c6df473d8ebd3d649c29a694236521df2f29c77626aba4b907847c4", "updated_at": "2020-02-21T18:58:20Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "548da32032c62ddc55e3cfcbe7d2c278", "name": "juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "548da32032c62ddc55e3cfcbe7d2c278", "created_at": "2020-02-21T18:58:16Z", "os_hidden": false, "protected": false, "os_hash_value": "4fc9fb3c0c561cd1f732f85159b7188a9ef823c921f1eb6bc1dc39d9d71d57e10c005bbb20ce0eb92ebed51956e4f3396762cf49708c0bb965b6c554ade1879e"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T00:58:58Z", "file": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/file", "owner": "457b822374de45b5a7624827c06b5ff5", "id": "39314c02-c40c-4670-9cb2-fab681f3ccd5", "size": 12716032, "self": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "visibility": "public", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/snap", "metadata": {}}], "min_disk": 0, "virtual_size": null, "name": "cirros-0.4.0-x86_64-disk", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T00:58:56Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}], "schema": "/v2/schemas/images", "first": "/v2/images"} 2020-02-21 20:07:43,564 - keystoneauth.session - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-556561f4-33c6-4ba9-ac42-b4867f4c5d2f 2020-02-21 20:07:43,564 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.GET.images in 0.04743242263793945s 2020-02-21 20:07:43,565 - shade.request_ids - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-556561f4-33c6-4ba9-ac42-b4867f4c5d2f 2020-02-21 20:07:43,576 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.POST.images 2020-02-21 20:07:43,579 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/image/v2/images -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"disk_format": "qcow2", "container_format": "bare", "visibility": "public", "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "owner_specified.shade.object": "images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "hw_scsi_model": "virtio-scsi", "hw_disk_bus": "scsi", "name": "neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139"}' 2020-02-21 20:07:43,636 - keystoneauth.session - DEBUG - RESP: [201] Connection: close Content-Length: 1005 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:43 GMT Location: http://127.0.0.1:60999/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6 OpenStack-image-import-methods: glance-direct,web-download Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-ea32be1f-988e-4b13-83d3-63d9ebbad60b 2020-02-21 20:07:43,637 - keystoneauth.session - DEBUG - RESP BODY: {"container_format": "bare", "min_ram": 0, "locations": [], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c1ebc986-defc-4493-a8ae-da6742059ec6", "size": null, "self": "/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6", "disk_format": "qcow2", "os_hash_algo": null, "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "queued", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:44Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": null, "created_at": "2020-02-21T20:07:44Z", "os_hidden": false, "protected": false, "os_hash_value": null} 2020-02-21 20:07:43,637 - keystoneauth.session - DEBUG - POST call to image for http://172.30.12.85/image/v2/images used request id req-ea32be1f-988e-4b13-83d3-63d9ebbad60b 2020-02-21 20:07:43,637 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.POST.images in 0.060672760009765625s 2020-02-21 20:07:43,638 - shade.request_ids - DEBUG - POST call to image for http://172.30.12.85/image/v2/images used request id req-ea32be1f-988e-4b13-83d3-63d9ebbad60b returning object c1ebc986-defc-4493-a8ae-da6742059ec6 2020-02-21 20:07:43,638 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.PUT.images.file 2020-02-21 20:07:43,642 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file -H "Content-Type: application/octet-stream" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '<_io.BufferedReader name='/home/opnfv/functest/images/cirros-0.4.0-x86_64-disk.img'>' 2020-02-21 20:07:44,053 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Content-Type: text/html; charset=UTF-8 Date: Fri, 21 Feb 2020 20:07:43 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-ad485448-141d-4595-84c0-62c8d68aa337 2020-02-21 20:07:44,053 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2020-02-21 20:07:44,053 - keystoneauth.session - DEBUG - PUT call to image for http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file used request id req-ad485448-141d-4595-84c0-62c8d68aa337 2020-02-21 20:07:44,053 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.PUT.images.file in 0.41448378562927246s 2020-02-21 20:07:44,053 - shade.request_ids - DEBUG - PUT call to image for http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file used request id req-ad485448-141d-4595-84c0-62c8d68aa337 2020-02-21 20:07:44,056 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.GET.images 2020-02-21 20:07:44,059 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image/v2/images -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:07:44,119 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 8561 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:44 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-fc1dc4ca-ab3d-4047-9f97-44c9da9d29d0 2020-02-21 20:07:44,120 - keystoneauth.session - DEBUG - RESP BODY: {"images": [{"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c1ebc986-defc-4493-a8ae-da6742059ec6/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c1ebc986-defc-4493-a8ae-da6742059ec6", "size": 12716032, "self": "/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:44Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:07:44Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "size": 12716032, "self": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:10Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:07:09Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:51Z", "file": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/file", "owner": "b809462365774c4199739c1470056632", "id": "328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "size": 12716032, "self": "/v2/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/328ae9ac-0c44-4a56-b8f0-8a79126a3c46/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_alt_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:51Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:06:22Z", "file": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/file", "owner": "b809462365774c4199739c1470056632", "id": "be97ddff-c952-4909-91a7-58e3ca4f18d6", "size": 12716032, "self": "/v2/images/be97ddff-c952-4909-91a7-58e3ca4f18d6", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/be97ddff-c952-4909-91a7-58e3ca4f18d6/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_f2e95b71-7be0-4b0b-ad70-67491fc794e4", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:06:21Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "71c7e3e7-79cb-4427-b592-b9ad56664f37", "size": 264897024, "self": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "3c4ad0defbe729dd3c16d2851d775575d1c5351c85734418d3b89bfdfd28ebd1", "updated_at": "2020-02-21T18:58:28Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "72eec501d849cb834c8da0b21b295c66", "name": "juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "72eec501d849cb834c8da0b21b295c66", "created_at": "2020-02-21T18:58:24Z", "os_hidden": false, "protected": false, "os_hash_value": "68a5054c2588605e779c131589ecf7a737a71b856a31c0e2fd97c1026ad97cf7371ab5e431cf3519f0a924238cc05cc11e27a2a317967c118774020976808d6d"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "e77771b0-6a39-4681-8e79-ee30ccd2db49", "size": 297140224, "self": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "070af1947c6df473d8ebd3d649c29a694236521df2f29c77626aba4b907847c4", "updated_at": "2020-02-21T18:58:20Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "548da32032c62ddc55e3cfcbe7d2c278", "name": "juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "548da32032c62ddc55e3cfcbe7d2c278", "created_at": "2020-02-21T18:58:16Z", "os_hidden": false, "protected": false, "os_hash_value": "4fc9fb3c0c561cd1f732f85159b7188a9ef823c921f1eb6bc1dc39d9d71d57e10c005bbb20ce0eb92ebed51956e4f3396762cf49708c0bb965b6c554ade1879e"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T00:58:58Z", "file": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/file", "owner": "457b822374de45b5a7624827c06b5ff5", "id": "39314c02-c40c-4670-9cb2-fab681f3ccd5", "size": 12716032, "self": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "visibility": "public", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/snap", "metadata": {}}], "min_disk": 0, "virtual_size": null, "name": "cirros-0.4.0-x86_64-disk", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T00:58:56Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}], "schema": "/v2/schemas/images", "first": "/v2/images"} 2020-02-21 20:07:44,120 - keystoneauth.session - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-fc1dc4ca-ab3d-4047-9f97-44c9da9d29d0 2020-02-21 20:07:44,120 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.GET.images in 0.06412696838378906s 2020-02-21 20:07:44,121 - shade.request_ids - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-fc1dc4ca-ab3d-4047-9f97-44c9da9d29d0 2020-02-21 20:07:44,125 - functest.core.singlevm - DEBUG - image: Munch({'location': Munch({'cloud': 'envvars', 'region_name': 'RegionOne', 'zone': None, 'project': Munch({'id': '3bb960f3511b4610bdd88acf066f912d', 'name': 'neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'domain_id': None, 'domain_name': 'Default'})}), 'created_at': '2020-02-21T20:07:44Z', 'updated_at': '2020-02-21T20:07:44Z', 'checksum': '443b7623e27ecf03dc9e01ee93f67afe', 'container_format': 'bare', 'direct_url': None, 'disk_format': 'qcow2', 'file': '/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6/file', 'id': 'c1ebc986-defc-4493-a8ae-da6742059ec6', 'name': 'neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner': '3bb960f3511b4610bdd88acf066f912d', 'tags': [], 'status': 'active', 'min_ram': 0, 'min_disk': 0, 'size': 12716032, 'virtual_size': 0, 'is_protected': False, 'locations': [Munch({'url': 'rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c1ebc986-defc-4493-a8ae-da6742059ec6/snap', 'metadata': Munch({})})], 'properties': {'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78'}, 'is_public': True, 'visibility': 'public', 'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78', 'protected': False, 'metadata': {'hw_scsi_model': 'virtio-scsi', 'self': '/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6', 'os_hash_algo': 'sha512', 'hw_disk_bus': 'scsi', 'schema': '/v2/schemas/image', 'owner_specified.shade.sha256': 'a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8', 'owner_specified.shade.object': 'images/neutron_trunk-img_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'owner_specified.shade.md5': '443b7623e27ecf03dc9e01ee93f67afe', 'os_hidden': False, 'os_hash_value': '6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78'}, 'created': '2020-02-21T20:07:44Z', 'updated': '2020-02-21T20:07:44Z', 'minDisk': 0, 'minRam': 0}) 2020-02-21 20:07:44,126 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.POST.flavors 2020-02-21 20:07:44,129 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/compute/v2.1/flavors -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"flavor": {"disk": 1, "OS-FLV-EXT-DATA:ephemeral": 0, "id": null, "os-flavor-access:is_public": true, "name": "neutron_trunk-flavor_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "ram": 1024, "rxtx_factor": 1.0, "swap": 0, "vcpus": 1}}' 2020-02-21 20:07:44,194 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 524 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:44 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-372e9ab8-3cb3-4578-a9cb-36789a6bef5a x-openstack-request-id: req-372e9ab8-3cb3-4578-a9cb-36789a6bef5a 2020-02-21 20:07:44,195 - keystoneauth.session - DEBUG - RESP BODY: {"flavor": {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "name": "neutron_trunk-flavor_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}} 2020-02-21 20:07:44,195 - keystoneauth.session - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors used request id req-372e9ab8-3cb3-4578-a9cb-36789a6bef5a 2020-02-21 20:07:44,195 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.POST.flavors in 0.06876468658447266s 2020-02-21 20:07:44,196 - shade.request_ids - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors used request id req-372e9ab8-3cb3-4578-a9cb-36789a6bef5a 2020-02-21 20:07:44,196 - functest.core.singlevm - DEBUG - flavor: Munch({'location': Munch({'cloud': 'envvars', 'region_name': 'RegionOne', 'zone': None, 'project': Munch({'id': '3a550fb8c83e4161886059d8b8d86710', 'name': 'demo', 'domain_id': None, 'domain_name': 'Default'})}), 'id': '1dd42764-6abc-40c2-9b2b-915de2ecdcc9', 'name': 'neutron_trunk-flavor_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'is_public': True, 'is_disabled': False, 'ram': 1024, 'vcpus': 1, 'disk': 1, 'ephemeral': 0, 'swap': 0, 'rxtx_factor': 1.0, 'properties': Munch({'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}), 'extra_specs': Munch({}), 'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}) 2020-02-21 20:07:44,197 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.POST.flavors.os-extra_specs 2020-02-21 20:07:44,200 - keystoneauth.session - DEBUG - REQ: curl -g -i -X POST http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9/os-extra_specs -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" -d '{"extra_specs": {}}' 2020-02-21 20:07:44,251 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 19 Content-Type: application/json Date: Fri, 21 Feb 2020 20:07:44 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-54debe93-440d-4507-9799-0e2e1f27f963 x-openstack-request-id: req-54debe93-440d-4507-9799-0e2e1f27f963 2020-02-21 20:07:44,251 - keystoneauth.session - DEBUG - RESP BODY: {"extra_specs": {}} 2020-02-21 20:07:44,251 - keystoneauth.session - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9/os-extra_specs used request id req-54debe93-440d-4507-9799-0e2e1f27f963 2020-02-21 20:07:44,252 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.POST.flavors.os-extra_specs in 0.05430936813354492s 2020-02-21 20:07:44,252 - shade.request_ids - DEBUG - POST call to compute for http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9/os-extra_specs used request id req-54debe93-440d-4507-9799-0e2e1f27f963 2020-02-21 20:07:44,252 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - flavor: Munch({'location': Munch({'cloud': 'envvars', 'region_name': 'RegionOne', 'zone': None, 'project': Munch({'id': '3a550fb8c83e4161886059d8b8d86710', 'name': 'demo', 'domain_id': None, 'domain_name': 'Default'})}), 'id': '1dd42764-6abc-40c2-9b2b-915de2ecdcc9', 'name': 'neutron_trunk-flavor_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139', 'is_public': True, 'is_disabled': False, 'ram': 1024, 'vcpus': 1, 'disk': 1, 'ephemeral': 0, 'swap': 0, 'rxtx_factor': 1.0, 'properties': Munch({'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}), 'extra_specs': Munch({}), 'OS-FLV-DISABLED:disabled': False, 'os-flavor-access:is_public': True, 'OS-FLV-EXT-DATA:ephemeral': 0}) 2020-02-21 20:07:49,188 - functest.opnfv_tests.openstack.tempest.tempest - INFO - rally verify configure-verifier --reconfigure --id opnfv-tempest 2020-02-21 20:07:49,189 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - Looking for tempest.conf file... 2020-02-21 20:07:49,189 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - Updating selected tempest.conf parameters... 2020-02-21 20:07:49,193 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - Add/Update required params defined in tempest_conf.yaml into tempest.conf file 2020-02-21 20:07:49,231 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - Generating test case list... 2020-02-21 20:07:55,162 - functest.opnfv_tests.openstack.tempest.tempest - INFO - (cd /root/.rally/verification/verifier-86d619a5-8992-4c6a-a71f-c3dba7649bc9/repo; stestr list 'neutron_tempest_plugin.(api|scenario).test_trunk' >/home/opnfv/functest/results/neutron_trunk/test_list.txt 2>/dev/null) 2020-02-21 20:07:55,163 - functest.opnfv_tests.openstack.tempest.tempest - DEBUG - Applying tempest blacklist... 2020-02-21 20:07:55,180 - functest.opnfv_tests.openstack.tempest.tempest - INFO - Starting Tempest test suite: '['rally', 'verify', 'start', '--load-list', '/home/opnfv/functest/results/neutron_trunk/test_list.txt']'. 2020-02-21 20:14:08,709 - functest.opnfv_tests.openstack.tempest.tempest - INFO - Verification UUID: 6aef1638-9f6e-47a9-8968-2c73adc49b31 2020-02-21 20:14:08,714 - functest.opnfv_tests.openstack.tempest.tempest - INFO - Showing result for a verification: '['rally', 'verify', 'show', '--uuid', '6aef1638-9f6e-47a9-8968-2c73adc49b31']'. 2020-02-21 20:14:10,193 - functest.opnfv_tests.openstack.tempest.tempest - INFO - +-----------------------------------------------------------------------------------------+ 2020-02-21 20:14:10,194 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Verification | 2020-02-21 20:14:10,194 - functest.opnfv_tests.openstack.tempest.tempest - INFO - +---------------------+-------------------------------------------------------------------+ 2020-02-21 20:14:10,195 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | UUID | 6aef1638-9f6e-47a9-8968-2c73adc49b31 | 2020-02-21 20:14:10,195 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Status | failed | 2020-02-21 20:14:10,195 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Started at | 2020-02-21 20:07:59 | 2020-02-21 20:14:10,195 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Finished at | 2020-02-21 20:14:08 | 2020-02-21 20:14:10,196 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Duration | 0:06:09 | 2020-02-21 20:14:10,196 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Run arguments | load_list: (value is too long, use 'detailed' flag to display it) | 2020-02-21 20:14:10,196 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Tags | - | 2020-02-21 20:14:10,196 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Verifier name | opnfv-tempest (UUID: 86d619a5-8992-4c6a-a71f-c3dba7649bc9) | 2020-02-21 20:14:10,196 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Verifier type | tempest (platform: openstack) | 2020-02-21 20:14:10,197 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Deployment name | opnfv-rally (UUID: e9d50b47-9538-464e-bfee-0bc99e60cc28) | 2020-02-21 20:14:10,197 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Tests count | 53 | 2020-02-21 20:14:10,197 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Tests duration, sec | 349.045 | 2020-02-21 20:14:10,197 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Success | 42 | 2020-02-21 20:14:10,198 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Skipped | 9 | 2020-02-21 20:14:10,198 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Expected failures | 0 | 2020-02-21 20:14:10,198 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Unexpected success | 0 | 2020-02-21 20:14:10,198 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Failures | 2 | 2020-02-21 20:14:10,198 - functest.opnfv_tests.openstack.tempest.tempest - INFO - +---------------------+-------------------------------------------------------------------+ 2020-02-21 20:14:10,199 - functest.opnfv_tests.openstack.tempest.tempest - INFO - +------------------------------------------------------------------------------------------------------------------------------------------------------+ 2020-02-21 20:14:10,199 - functest.opnfv_tests.openstack.tempest.tempest - INFO - | Tests | 2020-02-21 20:14:10,270 - functest.opnfv_tests.openstack.tempest.tempest - INFO - Tempest neutron_trunk success_rate is 95.45454545454545% 2020-02-21 20:14:10,271 - functest.opnfv_tests.openstack.rally.rally - DEBUG - running command: ['rally', 'verify', 'report', '--type', 'html', '--uuid', '6aef1638-9f6e-47a9-8968-2c73adc49b31', '--to', '/home/opnfv/functest/results/neutron_trunk/tempest-report.html'] 2020-02-21 20:14:14,076 - functest.opnfv_tests.openstack.rally.rally - INFO - rally verify report --type html --uuid 6aef1638-9f6e-47a9-8968-2c73adc49b31 --to /home/opnfv/functest/results/neutron_trunk/tempest-report.html Saving the report to '/home/opnfv/functest/results/neutron_trunk/tempest-report.html' file. It may take some time. The report has been successfully saved. 2020-02-21 20:14:14,077 - functest.opnfv_tests.openstack.rally.rally - DEBUG - running command: ['rally', 'verify', 'report', '--type', 'junit-xml', '--uuid', '6aef1638-9f6e-47a9-8968-2c73adc49b31', '--to', '/home/opnfv/functest/results/neutron_trunk/tempest-report.xml'] 2020-02-21 20:14:18,271 - functest.opnfv_tests.openstack.rally.rally - INFO - rally verify report --type junit-xml --uuid 6aef1638-9f6e-47a9-8968-2c73adc49b31 --to /home/opnfv/functest/results/neutron_trunk/tempest-report.xml Saving the report to '/home/opnfv/functest/results/neutron_trunk/tempest-report.xml' file. It may take some time. The report has been successfully saved. 2020-02-21 20:14:18,272 - xtesting.ci.run_tests - INFO - Test result: +-----------------------+------------------+------------------+----------------+ | TEST CASE | PROJECT | DURATION | RESULT | +-----------------------+------------------+------------------+----------------+ | neutron_trunk | functest | 07:17 | FAIL | +-----------------------+------------------+------------------+----------------+ 2020-02-21 20:14:18,284 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.DELETE.images 2020-02-21 20:14:18,287 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6 -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:19,118 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Content-Type: text/html; charset=UTF-8 Date: Fri, 21 Feb 2020 20:14:18 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-a10e7736-b953-4d3a-bd5d-352ebb2acc60 2020-02-21 20:14:19,118 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2020-02-21 20:14:19,118 - keystoneauth.session - DEBUG - DELETE call to image for http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6 used request id req-a10e7736-b953-4d3a-bd5d-352ebb2acc60 2020-02-21 20:14:19,118 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.DELETE.images in 0.8342828750610352s 2020-02-21 20:14:19,118 - shade.request_ids - DEBUG - DELETE call to image for http://172.30.12.85/image/v2/images/c1ebc986-defc-4493-a8ae-da6742059ec6 used request id req-a10e7736-b953-4d3a-bd5d-352ebb2acc60 2020-02-21 20:14:19,119 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.GET.flavors.detail 2020-02-21 20:14:19,121 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:19,395 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7346 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:19 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-58ccee7a-a732-46df-80a8-bb89ef13d43f x-openstack-request-id: req-58ccee7a-a732-46df-80a8-bb89ef13d43f 2020-02-21 20:14:19,396 - keystoneauth.session - DEBUG - RESP BODY: {"flavors": [{"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/0ea21233-fd36-456f-abae-92edf73abff4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/0ea21233-fd36-456f-abae-92edf73abff4", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "0ea21233-fd36-456f-abae-92edf73abff4", "name": "juju_epc-flavor_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/1", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "1", "name": "m1.tiny", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "1dd42764-6abc-40c2-9b2b-915de2ecdcc9", "name": "neutron_trunk-flavor_alt_f7f9587f-7171-4f18-8f05-6b1018bd5139", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/2", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/2", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 20, "id": "2", "name": "m1.small", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/3", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/3", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 40, "id": "3", "name": "m1.medium", "vcpus": 2, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/4", "rel": "bookmark"}], "ram": 8192, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 80, "id": "4", "name": "m1.large", "vcpus": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/42", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/42", "rel": "bookmark"}], "ram": 64, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "42", "name": "m1.nano", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/5", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/5", "rel": "bookmark"}], "ram": 16384, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 160, "id": "5", "name": "m1.xlarge", "vcpus": 8, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/5bd05330-7159-4d96-8d2d-9abc182df971", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/5bd05330-7159-4d96-8d2d-9abc182df971", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "5bd05330-7159-4d96-8d2d-9abc182df971", "name": "patrole-flavor_alt_c9449aea-7375-422f-b76a-ec410c1f47ef", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "76049132-d7c1-4cdc-a038-90bff8ac53db", "name": "neutron_trunk-flavor_f7f9587f-7171-4f18-8f05-6b1018bd5139", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/84", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/84", "rel": "bookmark"}], "ram": 128, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "84", "name": "m1.micro", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/c1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/c1", "rel": "bookmark"}], "ram": 256, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "c1", "name": "cirros256", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d1", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 5, "id": "d1", "name": "ds512M", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d2", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d2", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d2", "name": "ds1G", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d3", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d3", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d3", "name": "ds2G", "vcpus": 2, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d4", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 20, "id": "d4", "name": "ds4G", "vcpus": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "name": "juju_epc-flavor_64dbbf47-6096-48af-b335-651ad4c27a64", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "name": "patrole-flavor_c9449aea-7375-422f-b76a-ec410c1f47ef", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}]} 2020-02-21 20:14:19,396 - keystoneauth.session - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None used request id req-58ccee7a-a732-46df-80a8-bb89ef13d43f 2020-02-21 20:14:19,397 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.GET.flavors.detail in 0.27781057357788086s 2020-02-21 20:14:19,397 - shade.request_ids - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None used request id req-58ccee7a-a732-46df-80a8-bb89ef13d43f 2020-02-21 20:14:19,404 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.DELETE.flavors 2020-02-21 20:14:19,406 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9 -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:19,449 - keystoneauth.session - DEBUG - RESP: [202] Connection: close Content-Length: 0 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:19 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-5f678863-77ae-466c-bd9b-735391565528 x-openstack-request-id: req-5f678863-77ae-466c-bd9b-735391565528 2020-02-21 20:14:19,450 - keystoneauth.session - DEBUG - DELETE call to compute for http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9 used request id req-5f678863-77ae-466c-bd9b-735391565528 2020-02-21 20:14:19,450 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.DELETE.flavors in 0.04576230049133301s 2020-02-21 20:14:19,450 - shade.request_ids - DEBUG - DELETE call to compute for http://172.30.12.85/compute/v2.1/flavors/1dd42764-6abc-40c2-9b2b-915de2ecdcc9 used request id req-5f678863-77ae-466c-bd9b-735391565528 2020-02-21 20:14:19,451 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.PUT.routers.remove_router_interface 2020-02-21 20:14:19,451 - keystoneauth.session - DEBUG - REQ: curl -g -i -X PUT http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/remove_router_interface.json -H "Content-Type: application/json" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" -d '{"subnet_id": "fb3f8f76-88be-4fbe-b787-c76ef6e428c7"}' 2020-02-21 20:14:21,613 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 309 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:21 GMT X-Openstack-Request-Id: req-6d758a86-d2a5-4cd5-a929-e67f8a9e8c25 2020-02-21 20:14:21,613 - keystoneauth.session - DEBUG - RESP BODY: {"network_id": "fe7d03fe-398e-46c9-85e2-e9fb811d6d0e", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "subnet_id": "fb3f8f76-88be-4fbe-b787-c76ef6e428c7", "subnet_ids": ["fb3f8f76-88be-4fbe-b787-c76ef6e428c7"], "port_id": "da734f8f-3f6d-4366-8fc2-3cb59b6a9ba5", "id": "219b52b2-95dd-4d32-8f74-7b0be6e7e58d"} 2020-02-21 20:14:21,614 - keystoneauth.session - DEBUG - PUT call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/remove_router_interface.json used request id req-6d758a86-d2a5-4cd5-a929-e67f8a9e8c25 2020-02-21 20:14:21,614 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.PUT.routers.remove_router_interface in 2.1628761291503906s 2020-02-21 20:14:21,614 - shade.request_ids - DEBUG - PUT call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d/remove_router_interface.json used request id req-6d758a86-d2a5-4cd5-a929-e67f8a9e8c25 returning object 219b52b2-95dd-4d32-8f74-7b0be6e7e58d 2020-02-21 20:14:21,615 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.routers 2020-02-21 20:14:21,615 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/routers.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:21,776 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 2748 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:21 GMT X-Openstack-Request-Id: req-18d63365-e0eb-4445-a9d8-3777b8857a1b 2020-02-21 20:14:21,777 - keystoneauth.session - DEBUG - RESP BODY: {"routers": [{"status": "ACTIVE", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "32f6c915-45c6-4b3e-a816-f9e5eef96759", "ip_address": "172.24.4.19"}, {"subnet_id": "b8bece0a-ddbb-4741-b7ca-cf139e335f8e", "ip_address": "2001:db8::161"}]}, "description": "", "tags": [], "tenant_id": "f0ae165616b14cf5990f6671a5206457", "created_at": "2020-02-21T20:13:25Z", "admin_state_up": true, "updated_at": "2020-02-21T20:13:28Z", "revision_number": 3, "routes": [], "project_id": "f0ae165616b14cf5990f6671a5206457", "id": "1e4c285c-9ce7-43dc-b8c6-c5b33d6e4ee7", "name": "patrole-router_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"status": "ACTIVE", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "32f6c915-45c6-4b3e-a816-f9e5eef96759", "ip_address": "172.24.4.162"}, {"subnet_id": "b8bece0a-ddbb-4741-b7ca-cf139e335f8e", "ip_address": "2001:db8::96"}]}, "description": "", "tags": [], "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "created_at": "2020-02-21T20:07:04Z", "admin_state_up": true, "updated_at": "2020-02-21T20:14:20Z", "revision_number": 4, "routes": [], "project_id": "3bb960f3511b4610bdd88acf066f912d", "id": "219b52b2-95dd-4d32-8f74-7b0be6e7e58d", "name": "neutron_trunk-router_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"status": "ACTIVE", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "32f6c915-45c6-4b3e-a816-f9e5eef96759", "ip_address": "172.24.4.118"}, {"subnet_id": "b8bece0a-ddbb-4741-b7ca-cf139e335f8e", "ip_address": "2001:db8::1f5"}]}, "description": "", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:06Z", "admin_state_up": true, "updated_at": "2020-02-21T18:58:11Z", "revision_number": 3, "routes": [], "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "583275a9-55dc-4d2f-8793-616e421542af", "name": "juju_epc-router_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"status": "ACTIVE", "external_gateway_info": {"network_id": "cc73a4a8-eda0-4345-b031-0faf5535ddc1", "enable_snat": true, "external_fixed_ips": [{"subnet_id": "32f6c915-45c6-4b3e-a816-f9e5eef96759", "ip_address": "172.24.4.128"}, {"subnet_id": "b8bece0a-ddbb-4741-b7ca-cf139e335f8e", "ip_address": "2001:db8::1"}]}, "description": "", "tags": [], "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "created_at": "2020-02-21T00:59:48Z", "admin_state_up": true, "updated_at": "2020-02-21T01:00:12Z", "revision_number": 5, "routes": [], "project_id": "3a550fb8c83e4161886059d8b8d86710", "id": "dc144119-b29e-4c8b-aa9f-95a8bcf7fb0d", "name": "router1"}]} 2020-02-21 20:14:21,777 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/routers.json used request id req-18d63365-e0eb-4445-a9d8-3777b8857a1b 2020-02-21 20:14:21,777 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.routers in 0.16235685348510742s 2020-02-21 20:14:21,777 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/routers.json used request id req-18d63365-e0eb-4445-a9d8-3777b8857a1b 2020-02-21 20:14:21,778 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.DELETE.routers 2020-02-21 20:14:21,779 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:23,333 - keystoneauth.session - DEBUG - RESP: [204] Connection: keep-alive Content-Length: 0 Date: Fri, 21 Feb 2020 20:14:23 GMT X-Openstack-Request-Id: req-1f933bf4-dd4d-42cb-96a5-4099f5902362 2020-02-21 20:14:23,334 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:23,334 - keystoneauth.session - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d.json used request id req-1f933bf4-dd4d-42cb-96a5-4099f5902362 2020-02-21 20:14:23,334 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.DELETE.routers in 1.5558505058288574s 2020-02-21 20:14:23,334 - shade.request_ids - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/routers/219b52b2-95dd-4d32-8f74-7b0be6e7e58d.json used request id req-1f933bf4-dd4d-42cb-96a5-4099f5902362 2020-02-21 20:14:23,335 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.subnets 2020-02-21 20:14:23,335 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/subnets.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:23,439 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 5400 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:23 GMT X-Openstack-Request-Id: req-1d368778-c3a2-42dd-8e5c-267db910d7a9 2020-02-21 20:14:23,439 - keystoneauth.session - DEBUG - RESP BODY: {"subnets":[{"updated_at":"2020-02-21T01:03:31Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"192.168.233.2","end":"192.168.233.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"01f41653-ecbf-4ced-adb8-b13008abdf4e","dns_nameservers":[],"gateway_ip":"192.168.233.1","project_id":"457b822374de45b5a7624827c06b5ff5","description":"shared-subnet","tags":[],"cidr":"192.168.233.0/24","subnetpool_id":null,"service_types":[],"name":"shared-subnet","enable_dhcp":true,"segment_id":null,"network_id":"84c32ecd-4489-48c9-ab07-0424f59a9334","tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T01:03:31Z","ip_version":4},{"updated_at":"2020-02-21T01:00:00Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"172.24.4.2","end":"172.24.4.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"32f6c915-45c6-4b3e-a816-f9e5eef96759","dns_nameservers":[],"gateway_ip":"172.24.4.1","project_id":"457b822374de45b5a7624827c06b5ff5","description":"","tags":[],"cidr":"172.24.4.0/24","subnetpool_id":null,"service_types":[],"name":"public-subnet","enable_dhcp":false,"segment_id":null,"network_id":"cc73a4a8-eda0-4345-b031-0faf5535ddc1","tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T01:00:00Z","ip_version":4},{"updated_at":"2020-02-21T00:59:40Z","ipv6_ra_mode":"slaac","allocation_pools":[{"start":"fdd7:b7b0:38ce::2","end":"fdd7:b7b0:38ce:0:ffff:ffff:ffff:ffff"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":"slaac","id":"36da8052-dadc-4d65-bda8-84398147b1ed","dns_nameservers":[],"gateway_ip":"fdd7:b7b0:38ce::1","project_id":"3a550fb8c83e4161886059d8b8d86710","description":"","tags":[],"cidr":"fdd7:b7b0:38ce::/64","subnetpool_id":"b58c2a1a-f7b7-4ac2-80b7-b2b5af1b2310","service_types":[],"name":"ipv6-private-subnet","enable_dhcp":true,"segment_id":null,"network_id":"f23a5d51-77fd-4071-b570-cce4f4876686","tenant_id":"3a550fb8c83e4161886059d8b8d86710","created_at":"2020-02-21T00:59:40Z","ip_version":6},{"updated_at":"2020-02-21T20:13:23Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"5650157d-bfa8-4e09-b995-0bbdb51b1c1c","dns_nameservers":["8.8.8.8"],"gateway_ip":"192.168.120.1","project_id":"f0ae165616b14cf5990f6671a5206457","description":"","tags":[],"cidr":"192.168.120.0/24","subnetpool_id":null,"service_types":[],"name":"patrole-subnet_c9449aea-7375-422f-b76a-ec410c1f47ef","enable_dhcp":true,"segment_id":null,"network_id":"373135d8-c4ba-4883-b6a7-88837de9a56e","tenant_id":"f0ae165616b14cf5990f6671a5206457","created_at":"2020-02-21T20:13:23Z","ip_version":4},{"updated_at":"2020-02-21T18:58:04Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"68b51c78-1b8d-4682-a3b8-55f7c1e3d924","dns_nameservers":["8.8.8.8"],"gateway_ip":"192.168.120.1","project_id":"89f0296fc0c0431e81c8370bb90781d7","description":"","tags":[],"cidr":"192.168.120.0/24","subnetpool_id":null,"service_types":[],"name":"juju_epc-subnet_64dbbf47-6096-48af-b335-651ad4c27a64","enable_dhcp":true,"segment_id":null,"network_id":"3b453d58-0aed-4c70-97c5-3134a69941d7","tenant_id":"89f0296fc0c0431e81c8370bb90781d7","created_at":"2020-02-21T18:58:04Z","ip_version":4},{"updated_at":"2020-02-21T00:59:36Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"10.0.0.2","end":"10.0.0.62"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"722806d3-4529-467c-8873-928b2e24fdd8","dns_nameservers":[],"gateway_ip":"10.0.0.1","project_id":"3a550fb8c83e4161886059d8b8d86710","description":"","tags":[],"cidr":"10.0.0.0/26","subnetpool_id":"073d41f5-4e75-406f-bc21-5ddc094961b3","service_types":[],"name":"private-subnet","enable_dhcp":true,"segment_id":null,"network_id":"f23a5d51-77fd-4071-b570-cce4f4876686","tenant_id":"3a550fb8c83e4161886059d8b8d86710","created_at":"2020-02-21T00:59:36Z","ip_version":4},{"updated_at":"2020-02-21T01:00:10Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"2001:db8::3","end":"2001:db8::ffff:ffff:ffff:ffff"},{"start":"2001:db8::1","end":"2001:db8::1"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"b8bece0a-ddbb-4741-b7ca-cf139e335f8e","dns_nameservers":[],"gateway_ip":"2001:db8::2","project_id":"457b822374de45b5a7624827c06b5ff5","description":"","tags":[],"cidr":"2001:db8::/64","subnetpool_id":null,"service_types":[],"name":"ipv6-public-subnet","enable_dhcp":false,"segment_id":null,"network_id":"cc73a4a8-eda0-4345-b031-0faf5535ddc1","tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T01:00:10Z","ip_version":6},{"updated_at":"2020-02-21T20:07:02Z","ipv6_ra_mode":null,"allocation_pools":[{"start":"192.168.120.2","end":"192.168.120.254"}],"host_routes":[],"revision_number":0,"ipv6_address_mode":null,"id":"fb3f8f76-88be-4fbe-b787-c76ef6e428c7","dns_nameservers":["8.8.8.8"],"gateway_ip":"192.168.120.1","project_id":"3bb960f3511b4610bdd88acf066f912d","description":"","tags":[],"cidr":"192.168.120.0/24","subnetpool_id":null,"service_types":[],"name":"neutron_trunk-subnet_f7f9587f-7171-4f18-8f05-6b1018bd5139","enable_dhcp":true,"segment_id":null,"network_id":"fe7d03fe-398e-46c9-85e2-e9fb811d6d0e","tenant_id":"3bb960f3511b4610bdd88acf066f912d","created_at":"2020-02-21T20:07:02Z","ip_version":4}]} 2020-02-21 20:14:23,440 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/subnets.json used request id req-1d368778-c3a2-42dd-8e5c-267db910d7a9 2020-02-21 20:14:23,440 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.subnets in 0.10494494438171387s 2020-02-21 20:14:23,440 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/subnets.json used request id req-1d368778-c3a2-42dd-8e5c-267db910d7a9 2020-02-21 20:14:23,442 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.DELETE.subnets 2020-02-21 20:14:23,443 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85:9696/v2.0/subnets/fb3f8f76-88be-4fbe-b787-c76ef6e428c7.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:25,663 - keystoneauth.session - DEBUG - RESP: [204] Connection: keep-alive Content-Length: 0 Date: Fri, 21 Feb 2020 20:14:25 GMT X-Openstack-Request-Id: req-554818d1-ba2e-4281-a287-8c8511ddb175 2020-02-21 20:14:25,664 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:25,664 - keystoneauth.session - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/subnets/fb3f8f76-88be-4fbe-b787-c76ef6e428c7.json used request id req-554818d1-ba2e-4281-a287-8c8511ddb175 2020-02-21 20:14:25,664 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.DELETE.subnets in 2.2215585708618164s 2020-02-21 20:14:25,664 - shade.request_ids - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/subnets/fb3f8f76-88be-4fbe-b787-c76ef6e428c7.json used request id req-554818d1-ba2e-4281-a287-8c8511ddb175 2020-02-21 20:14:25,664 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.networks 2020-02-21 20:14:25,666 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/networks.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:25,800 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 4434 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:25 GMT X-Openstack-Request-Id: req-738556b5-9a84-4285-809e-8711a988e70b 2020-02-21 20:14:25,801 - keystoneauth.session - DEBUG - RESP BODY: {"networks":[{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"373135d8-c4ba-4883-b6a7-88837de9a56e","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":48,"ipv4_address_scope":null,"shared":true,"project_id":"f0ae165616b14cf5990f6671a5206457","l2_adjacency":true,"status":"ACTIVE","subnets":["5650157d-bfa8-4e09-b995-0bbdb51b1c1c"],"description":"","tags":[],"updated_at":"2020-02-21T20:13:23Z","qos_policy_id":null,"name":"patrole-net_c9449aea-7375-422f-b76a-ec410c1f47ef","admin_state_up":true,"tenant_id":"f0ae165616b14cf5990f6671a5206457","created_at":"2020-02-21T20:13:22Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"3b453d58-0aed-4c70-97c5-3134a69941d7","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":23,"ipv4_address_scope":null,"shared":false,"project_id":"89f0296fc0c0431e81c8370bb90781d7","l2_adjacency":true,"status":"ACTIVE","subnets":["68b51c78-1b8d-4682-a3b8-55f7c1e3d924"],"description":"","tags":[],"updated_at":"2020-02-21T18:58:04Z","qos_policy_id":null,"name":"juju_epc-net_64dbbf47-6096-48af-b335-651ad4c27a64","admin_state_up":true,"tenant_id":"89f0296fc0c0431e81c8370bb90781d7","created_at":"2020-02-21T18:58:03Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":2,"port_security_enabled":true,"mtu":1342,"id":"84c32ecd-4489-48c9-ab07-0424f59a9334","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":96,"ipv4_address_scope":null,"shared":true,"project_id":"457b822374de45b5a7624827c06b5ff5","l2_adjacency":true,"status":"ACTIVE","subnets":["01f41653-ecbf-4ced-adb8-b13008abdf4e"],"description":"","tags":[],"updated_at":"2020-02-21T01:03:31Z","qos_policy_id":null,"name":"shared","admin_state_up":true,"tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T01:03:28Z","provider:network_type":"geneve"},{"provider:physical_network":"public","updated_at":"2020-02-21T01:18:39Z","dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1400,"id":"cc73a4a8-eda0-4345-b031-0faf5535ddc1","router:external":true,"availability_zone_hints":[],"availability_zones":[],"name":"public","ipv4_address_scope":null,"shared":false,"project_id":"457b822374de45b5a7624827c06b5ff5","l2_adjacency":true,"status":"ACTIVE","subnets":["32f6c915-45c6-4b3e-a816-f9e5eef96759","b8bece0a-ddbb-4741-b7ca-cf139e335f8e"],"description":"gman","tags":[],"ipv6_address_scope":null,"is_default":true,"provider:segmentation_id":null,"qos_policy_id":null,"admin_state_up":true,"tenant_id":"457b822374de45b5a7624827c06b5ff5","created_at":"2020-02-21T00:59:53Z","provider:network_type":"flat"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1342,"id":"f23a5d51-77fd-4071-b570-cce4f4876686","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":84,"ipv4_address_scope":null,"shared":false,"project_id":"3a550fb8c83e4161886059d8b8d86710","l2_adjacency":true,"status":"ACTIVE","subnets":["722806d3-4529-467c-8873-928b2e24fdd8","36da8052-dadc-4d65-bda8-84398147b1ed"],"description":"","tags":[],"updated_at":"2020-02-21T00:59:40Z","qos_policy_id":null,"name":"private","admin_state_up":true,"tenant_id":"3a550fb8c83e4161886059d8b8d86710","created_at":"2020-02-21T00:59:32Z","provider:network_type":"geneve"},{"provider:physical_network":null,"ipv6_address_scope":null,"dns_domain":"","revision_number":3,"port_security_enabled":true,"mtu":1342,"id":"fe7d03fe-398e-46c9-85e2-e9fb811d6d0e","router:external":false,"availability_zone_hints":[],"availability_zones":[],"provider:segmentation_id":63,"ipv4_address_scope":null,"shared":true,"project_id":"3bb960f3511b4610bdd88acf066f912d","l2_adjacency":true,"status":"ACTIVE","subnets":[],"description":"","tags":[],"updated_at":"2020-02-21T20:14:25Z","qos_policy_id":null,"name":"neutron_trunk-net_f7f9587f-7171-4f18-8f05-6b1018bd5139","admin_state_up":true,"tenant_id":"3bb960f3511b4610bdd88acf066f912d","created_at":"2020-02-21T20:07:01Z","provider:network_type":"geneve"}]} 2020-02-21 20:14:25,801 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-738556b5-9a84-4285-809e-8711a988e70b 2020-02-21 20:14:25,801 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.networks in 0.1366136074066162s 2020-02-21 20:14:25,811 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/networks.json used request id req-738556b5-9a84-4285-809e-8711a988e70b 2020-02-21 20:14:25,812 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.DELETE.networks 2020-02-21 20:14:25,812 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85:9696/v2.0/networks/fe7d03fe-398e-46c9-85e2-e9fb811d6d0e.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:27,303 - keystoneauth.session - DEBUG - RESP: [204] Connection: keep-alive Content-Length: 0 Date: Fri, 21 Feb 2020 20:14:27 GMT X-Openstack-Request-Id: req-c769b2d5-08f8-466f-86a5-92d5a5a0ecfd 2020-02-21 20:14:27,303 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:27,303 - keystoneauth.session - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/networks/fe7d03fe-398e-46c9-85e2-e9fb811d6d0e.json used request id req-c769b2d5-08f8-466f-86a5-92d5a5a0ecfd 2020-02-21 20:14:27,304 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.DELETE.networks in 1.4917397499084473s 2020-02-21 20:14:27,304 - shade.request_ids - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/networks/fe7d03fe-398e-46c9-85e2-e9fb811d6d0e.json used request id req-c769b2d5-08f8-466f-86a5-92d5a5a0ecfd 2020-02-21 20:14:27,308 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.GET.images 2020-02-21 20:14:27,312 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/image/v2/images -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:27,369 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7272 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:27 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-39bd7774-f432-45d3-9dee-620871f193e9 2020-02-21 20:14:27,370 - keystoneauth.session - DEBUG - RESP BODY: {"images": [{"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:14:01Z", "file": "/v2/images/be4e3aca-3e45-49cc-b866-9e1e310e772d/file", "owner": "f0ae165616b14cf5990f6671a5206457", "id": "be4e3aca-3e45-49cc-b866-9e1e310e772d", "size": 12716032, "self": "/v2/images/be4e3aca-3e45-49cc-b866-9e1e310e772d", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/be4e3aca-3e45-49cc-b866-9e1e310e772d/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_alt_c9449aea-7375-422f-b76a-ec410c1f47ef", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_alt_c9449aea-7375-422f-b76a-ec410c1f47ef", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:14:01Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T20:13:31Z", "file": "/v2/images/d18c053a-f916-4710-ae90-261f3ede4cc1/file", "owner": "f0ae165616b14cf5990f6671a5206457", "id": "d18c053a-f916-4710-ae90-261f3ede4cc1", "size": 12716032, "self": "/v2/images/d18c053a-f916-4710-ae90-261f3ede4cc1", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/d18c053a-f916-4710-ae90-261f3ede4cc1/snap", "metadata": {}}], "visibility": "public", "owner_specified.shade.object": "images/patrole-img_c9449aea-7375-422f-b76a-ec410c1f47ef", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "patrole-img_c9449aea-7375-422f-b76a-ec410c1f47ef", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:13:30Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56/file", "owner": "3bb960f3511b4610bdd88acf066f912d", "id": "c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "size": 12716032, "self": "/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "a8dd75ecffd4cdd96072d60c2237b448e0c8b2bc94d57f10fdbc8c481d9005b8", "updated_at": "2020-02-21T20:07:10Z", "visibility": "public", "owner_specified.shade.object": "images/neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "443b7623e27ecf03dc9e01ee93f67afe", "name": "neutron_trunk-img_f7f9587f-7171-4f18-8f05-6b1018bd5139", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T20:07:09Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "71c7e3e7-79cb-4427-b592-b9ad56664f37", "size": 264897024, "self": "/v2/images/71c7e3e7-79cb-4427-b592-b9ad56664f37", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "3c4ad0defbe729dd3c16d2851d775575d1c5351c85734418d3b89bfdfd28ebd1", "updated_at": "2020-02-21T18:58:28Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "72eec501d849cb834c8da0b21b295c66", "name": "juju_epc-img_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "72eec501d849cb834c8da0b21b295c66", "created_at": "2020-02-21T18:58:24Z", "os_hidden": false, "protected": false, "os_hash_value": "68a5054c2588605e779c131589ecf7a737a71b856a31c0e2fd97c1026ad97cf7371ab5e431cf3519f0a924238cc05cc11e27a2a317967c118774020976808d6d"}, {"container_format": "bare", "min_ram": 0, "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/snap", "metadata": {}}], "hw_scsi_model": "virtio-scsi", "file": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49/file", "owner": "89f0296fc0c0431e81c8370bb90781d7", "id": "e77771b0-6a39-4681-8e79-ee30ccd2db49", "size": 297140224, "self": "/v2/images/e77771b0-6a39-4681-8e79-ee30ccd2db49", "disk_format": "qcow2", "os_hash_algo": "sha512", "hw_disk_bus": "scsi", "schema": "/v2/schemas/image", "status": "active", "tags": [], "owner_specified.shade.sha256": "070af1947c6df473d8ebd3d649c29a694236521df2f29c77626aba4b907847c4", "updated_at": "2020-02-21T18:58:20Z", "visibility": "private", "owner_specified.shade.object": "images/juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "min_disk": 0, "virtual_size": null, "owner_specified.shade.md5": "548da32032c62ddc55e3cfcbe7d2c278", "name": "juju_epc-img_64dbbf47-6096-48af-b335-651ad4c27a64", "checksum": "548da32032c62ddc55e3cfcbe7d2c278", "created_at": "2020-02-21T18:58:16Z", "os_hidden": false, "protected": false, "os_hash_value": "4fc9fb3c0c561cd1f732f85159b7188a9ef823c921f1eb6bc1dc39d9d71d57e10c005bbb20ce0eb92ebed51956e4f3396762cf49708c0bb965b6c554ade1879e"}, {"container_format": "bare", "min_ram": 0, "updated_at": "2020-02-21T00:58:58Z", "file": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/file", "owner": "457b822374de45b5a7624827c06b5ff5", "id": "39314c02-c40c-4670-9cb2-fab681f3ccd5", "size": 12716032, "self": "/v2/images/39314c02-c40c-4670-9cb2-fab681f3ccd5", "disk_format": "qcow2", "os_hash_algo": "sha512", "schema": "/v2/schemas/image", "status": "active", "tags": [], "visibility": "public", "locations": [{"url": "rbd://17d0ba52-8e9c-4ce5-832c-33a276f99252/images/39314c02-c40c-4670-9cb2-fab681f3ccd5/snap", "metadata": {}}], "min_disk": 0, "virtual_size": null, "name": "cirros-0.4.0-x86_64-disk", "checksum": "443b7623e27ecf03dc9e01ee93f67afe", "created_at": "2020-02-21T00:58:56Z", "os_hidden": false, "protected": false, "os_hash_value": "6513f21e44aa3da349f248188a44bc304a3653a04122d8fb4535423c8e1d14cd6a153f735bb0982e2161b5b5186106570c17a9e58b64dd39390617cd5a350f78"}], "schema": "/v2/schemas/images", "first": "/v2/images"} 2020-02-21 20:14:27,370 - keystoneauth.session - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-39bd7774-f432-45d3-9dee-620871f193e9 2020-02-21 20:14:27,370 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.GET.images in 0.06195855140686035s 2020-02-21 20:14:27,371 - shade.request_ids - DEBUG - GET call to image for http://172.30.12.85/image/v2/images used request id req-39bd7774-f432-45d3-9dee-620871f193e9 2020-02-21 20:14:27,375 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task image.DELETE.images 2020-02-21 20:14:27,379 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56 -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}ed3b2841228ef3c6a21ebe6db88afbd4f47c8c929c94fa84c755a37e3b19e394" 2020-02-21 20:14:27,793 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Content-Type: text/html; charset=UTF-8 Date: Fri, 21 Feb 2020 20:14:27 GMT Server: Apache/2.4.29 (Ubuntu) x-openstack-request-id: req-0741a5d7-bfdc-4611-94ee-11ce85a65e32 2020-02-21 20:14:27,793 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to text/html; charset=UTF-8. Only application/json responses have their bodies logged. 2020-02-21 20:14:27,793 - keystoneauth.session - DEBUG - DELETE call to image for http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56 used request id req-0741a5d7-bfdc-4611-94ee-11ce85a65e32 2020-02-21 20:14:27,794 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task image.DELETE.images in 0.4188411235809326s 2020-02-21 20:14:27,794 - shade.request_ids - DEBUG - DELETE call to image for http://172.30.12.85/image/v2/images/c6b95ae2-8a27-49e0-ac9d-b875aaa2ab56 used request id req-0741a5d7-bfdc-4611-94ee-11ce85a65e32 2020-02-21 20:14:27,794 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.GET.flavors.detail 2020-02-21 20:14:27,797 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:27,833 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 7313 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:27 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-fbd6b40f-9044-4bdf-beed-ebb5b5f31b69 x-openstack-request-id: req-fbd6b40f-9044-4bdf-beed-ebb5b5f31b69 2020-02-21 20:14:27,834 - keystoneauth.session - DEBUG - RESP BODY: {"flavors": [{"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/0ea21233-fd36-456f-abae-92edf73abff4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/0ea21233-fd36-456f-abae-92edf73abff4", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "0ea21233-fd36-456f-abae-92edf73abff4", "name": "juju_epc-flavor_alt_64dbbf47-6096-48af-b335-651ad4c27a64", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/1", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "1", "name": "m1.tiny", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/2", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/2", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 20, "id": "2", "name": "m1.small", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/3", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/3", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 40, "id": "3", "name": "m1.medium", "vcpus": 2, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/4", "rel": "bookmark"}], "ram": 8192, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 80, "id": "4", "name": "m1.large", "vcpus": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/42", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/42", "rel": "bookmark"}], "ram": 64, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "42", "name": "m1.nano", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/5", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/5", "rel": "bookmark"}], "ram": 16384, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 160, "id": "5", "name": "m1.xlarge", "vcpus": 8, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/5bd05330-7159-4d96-8d2d-9abc182df971", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/5bd05330-7159-4d96-8d2d-9abc182df971", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "5bd05330-7159-4d96-8d2d-9abc182df971", "name": "patrole-flavor_alt_c9449aea-7375-422f-b76a-ec410c1f47ef", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "76049132-d7c1-4cdc-a038-90bff8ac53db", "name": "neutron_trunk-flavor_f7f9587f-7171-4f18-8f05-6b1018bd5139", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/84", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/84", "rel": "bookmark"}], "ram": 128, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "84", "name": "m1.micro", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/9f918078-913a-494a-84b3-7c9c02f14567", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/9f918078-913a-494a-84b3-7c9c02f14567", "rel": "bookmark"}], "ram": 64, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 0, "id": "9f918078-913a-494a-84b3-7c9c02f14567", "name": "rally_verify_12aa3c7a_dXqh46Ie", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/c1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/c1", "rel": "bookmark"}], "ram": 256, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "c1", "name": "cirros256", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d1", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d1", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 5, "id": "d1", "name": "ds512M", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d2", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d2", "rel": "bookmark"}], "ram": 1024, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d2", "name": "ds1G", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d3", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d3", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d3", "name": "ds2G", "vcpus": 2, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d4", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d4", "rel": "bookmark"}], "ram": 4096, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 20, "id": "d4", "name": "ds4G", "vcpus": 4, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "rel": "bookmark"}], "ram": 2048, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 10, "id": "d4bbf7f8-cc4b-40d5-aef1-fe94762fbbfd", "name": "juju_epc-flavor_64dbbf47-6096-48af-b335-651ad4c27a64", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}, {"links": [{"href": "http://172.30.12.85/compute/v2.1/flavors/fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "rel": "self"}, {"href": "http://172.30.12.85/compute/flavors/fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "rel": "bookmark"}], "ram": 512, "OS-FLV-DISABLED:disabled": false, "os-flavor-access:is_public": true, "rxtx_factor": 1.0, "disk": 1, "id": "fb0ea9bf-0360-46b9-85d9-70ef2fe02310", "name": "patrole-flavor_c9449aea-7375-422f-b76a-ec410c1f47ef", "vcpus": 1, "swap": "", "OS-FLV-EXT-DATA:ephemeral": 0}]} 2020-02-21 20:14:27,834 - keystoneauth.session - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None used request id req-fbd6b40f-9044-4bdf-beed-ebb5b5f31b69 2020-02-21 20:14:27,835 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.GET.flavors.detail in 0.0401158332824707s 2020-02-21 20:14:27,835 - shade.request_ids - DEBUG - GET call to compute for http://172.30.12.85/compute/v2.1/flavors/detail?is_public=None used request id req-fbd6b40f-9044-4bdf-beed-ebb5b5f31b69 2020-02-21 20:14:27,843 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task compute.DELETE.flavors 2020-02-21 20:14:27,847 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:27,908 - keystoneauth.session - DEBUG - RESP: [202] Connection: close Content-Length: 0 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:27 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.29 (Ubuntu) Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-bfa293f4-3c93-4726-8f65-943326c4b01d x-openstack-request-id: req-bfa293f4-3c93-4726-8f65-943326c4b01d 2020-02-21 20:14:27,909 - keystoneauth.session - DEBUG - DELETE call to compute for http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db used request id req-bfa293f4-3c93-4726-8f65-943326c4b01d 2020-02-21 20:14:27,909 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task compute.DELETE.flavors in 0.06523561477661133s 2020-02-21 20:14:27,909 - shade.request_ids - DEBUG - DELETE call to compute for http://172.30.12.85/compute/v2.1/flavors/76049132-d7c1-4cdc-a038-90bff8ac53db used request id req-bfa293f4-3c93-4726-8f65-943326c4b01d 2020-02-21 20:14:27,916 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.security-groups 2020-02-21 20:14:27,916 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/security-groups.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:28,847 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 41678 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:28 GMT X-Openstack-Request-Id: req-a2ceef7f-59bd-4b17-bc61-88ac49a95fd2 2020-02-21 20:14:28,850 - keystoneauth.session - DEBUG - RESP BODY: {"security_groups": [{"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:06:27Z", "updated_at": "2020-02-21T19:06:27Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "530c6140-c5ba-4a6b-a998-44d7919017ae", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "ca68d7f4-f037-45ee-a4af-369ba82af620", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-3"}, {"description": "Default security group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:03Z", "updated_at": "2020-02-21T18:58:03Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "5b81ec76-ba0b-487f-a578-f9a39353bb9d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "8beaa92b-c2ce-412b-b713-16d24473b6a2", "remote_group_id": "163b6269-d469-423f-9626-77f900c5487c", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "a8c2f29b-5fe0-41cc-be59-6e51d71163e4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "bf37f0a3-1d45-448d-ab35-9a1f7f4938b9", "remote_group_id": "163b6269-d469-423f-9626-77f900c5487c", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "163b6269-d469-423f-9626-77f900c5487c", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "e479343d5fff47bb96822a0889fa3366", "created_at": "2020-02-21T01:06:51Z", "updated_at": "2020-02-21T01:06:51Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "278edddc-df57-4c13-a9b6-17a7823bc7eb", "remote_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv4", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "337cd6ae-f105-46ee-a55f-562f771fd598", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv4", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "3a5b395b-4754-48a8-b7ce-9bf1fbbe22e6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv6", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "3ca2ac53-718a-496b-a445-9501a21103c0", "remote_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv6", "project_id": "e479343d5fff47bb96822a0889fa3366"}], "revision_number": 1, "project_id": "e479343d5fff47bb96822a0889fa3366", "id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "f0ae165616b14cf5990f6671a5206457", "created_at": "2020-02-21T20:13:22Z", "updated_at": "2020-02-21T20:13:22Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "4113a51e-bae6-44a4-b814-6c21092b43b4", "remote_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv4", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "73b8f1b3-c484-4138-a98b-fe5dc13394b1", "remote_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv6", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "918dbe1c-9fd0-49da-9344-78e96c54ff63", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv4", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "cf41607c-d22e-4fc2-9734-5821392e8177", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv6", "project_id": "f0ae165616b14cf5990f6671a5206457"}], "revision_number": 1, "project_id": "f0ae165616b14cf5990f6671a5206457", "id": "55dbb139-0435-4a03-8633-92a770c9cc16", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:35Z", "updated_at": "2020-02-21T18:58:37Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "08805842-390f-491f-b283-3652c0c88953", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "0f4aefed-07a9-42d5-a32c-8c0dd87e626c", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "12351aad-3e18-4406-81c2-e51a236c1872", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "2cc29f0a-30a1-4845-bbfd-bdab64f2e0f8", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "518062eb-4534-4803-8eb9-f51a1b230a25", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "7444f955-d882-483e-8ec9-0eb2d1648102", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "8e726a72-83ee-421a-821c-626360c81547", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "a310ca50-359d-46bb-9652-62be02dcb3c9", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "be14edc5-e555-4871-9727-5d5f2b67235f", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "c8640b69-0145-4f4d-8859-bc921ebb3b9d", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "eab290ad-2342-412f-b575-dbe5e905e66b", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "ipv6-icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "eacca0bd-487a-4008-9773-be5f73d6df61", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 11, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-536bbce3-8558-4e82-81a4-5a1ff1b04ffa"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:37Z", "updated_at": "2020-02-21T18:58:37Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "23ecc159-1200-4153-891b-0a1fc99fbf97", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "6f549427-609c-42b6-8a87-e471e7c80557", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-536bbce3-8558-4e82-81a4-5a1ff1b04ffa-0"}, {"description": "Default security group", "tags": [], "tenant_id": "", "created_at": "2020-02-21T01:00:03Z", "updated_at": "2020-02-21T01:00:03Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "5462d949-c5db-4b6d-b667-4eb3c8a47813", "remote_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "b8301d7e-97f3-45f3-b136-85a2dc4939e5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "b995bfc3-6118-4cc7-a6ad-73e577f7a347", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "e49c656d-b97e-4814-a3df-be55a7808ace", "remote_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:03:48Z", "updated_at": "2020-02-21T19:03:48Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:03:48Z", "revision_number": 0, "id": "3597a40c-dec8-4277-8a49-1a7fb2ce299d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:03:48Z", "security_group_id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:03:48Z", "revision_number": 0, "id": "cbba8906-8a4e-47cd-93ec-ac55df41c14c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:03:48Z", "security_group_id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-1"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:02:50Z", "updated_at": "2020-02-21T19:06:27Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "30b8c25b-6872-4b8e-ba44-fdcaf7735c1f", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:50Z", "revision_number": 0, "id": "37241d63-fea1-4f04-bc1e-e7cff257ebec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:50Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "4b7c7ca0-2db4-4a79-a63d-b7b2b4db914f", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "67aaef4c-263a-4e30-91c4-611b61962b25", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "7f77d800-059a-468c-93c0-11df4177565e", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "8017f51c-21a8-4d84-8b1c-c626efde4a75", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:50Z", "revision_number": 0, "id": "a5114ae1-dc32-47bc-9821-fabd1386979f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:50Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "bba82a48-fa66-4555-be5a-9e798fc1a795", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "d536e76d-318f-40ea-b38a-23cda77b71a5", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "e1b6a891-fff9-49ab-899d-a6703afc9eb0", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "ipv6-icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "f89b3cc8-dc2f-40bd-8f13-9566e7ca5142", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "fb0434fc-bd4c-421b-9d29-1a08d742239f", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 47, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:02:52Z", "updated_at": "2020-02-21T19:02:52Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:52Z", "revision_number": 0, "id": "91598305-c82b-41a8-9670-fb7787688bd4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:52Z", "security_group_id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:52Z", "revision_number": 0, "id": "ba8dec00-e32b-4027-966e-9187ddb4d7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:52Z", "security_group_id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-0"}, {"description": "Default security group", "tags": [], "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "created_at": "2020-02-21T20:07:01Z", "updated_at": "2020-02-21T20:07:01Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "0c34ecd6-97ff-495e-abca-bc0576726cb4", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "37931a39-a3c9-46ab-861d-6e2c64f9dfe0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "e318f994-5ae1-434b-a60f-c0d2e54317d7", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "f93dfb51-41bf-489e-92ba-cac9adf7f8c7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}], "revision_number": 1, "project_id": "3bb960f3511b4610bdd88acf066f912d", "id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "created_at": "2020-02-21T15:16:29Z", "updated_at": "2020-02-21T15:16:29Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "16e72fa5-b30c-4e2e-814f-38ad140ea40b", "remote_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv4", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "48694fd3-4178-424f-a0bb-e4c551baa8b0", "remote_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv6", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "5e1bc03f-b953-44d2-acd2-06aad6f8d8a6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv6", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "988c00ec-7873-43af-8f7f-a868d19a68cc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv4", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}], "revision_number": 1, "project_id": "7b343734bc9049139d7e4a1fa7dcaae8", "id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "457b822374de45b5a7624827c06b5ff5", "created_at": "2020-02-21T00:59:53Z", "updated_at": "2020-02-21T00:59:53Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "c3666cb2-6213-42bf-befd-8e725beaa14f", "remote_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv4", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "cb6ab524-e3a3-48b7-bbe7-9db3e370e7f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv6", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "fe5bee18-c280-4dd1-825d-a15016dfbdff", "remote_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv6", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "ff285830-5bd8-4f2a-bec7-a80205aa6035", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv4", "project_id": "457b822374de45b5a7624827c06b5ff5"}], "revision_number": 1, "project_id": "457b822374de45b5a7624827c06b5ff5", "id": "db7eea14-599f-4820-b502-3ec857d5ef79", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "created_at": "2020-02-21T00:59:32Z", "updated_at": "2020-02-21T00:59:32Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "bf5042c6-5090-4386-a4a7-170ec1f0bb58", "remote_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv4", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "c866ac42-932c-461f-8cd3-6a23d8e2c9ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv6", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "cc702a75-f042-4cc6-b0e2-569ab1994aaa", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv4", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "e5c621bd-36c5-4206-98e2-96da16a5fe9f", "remote_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv6", "project_id": "3a550fb8c83e4161886059d8b8d86710"}], "revision_number": 1, "project_id": "3a550fb8c83e4161886059d8b8d86710", "id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:05:02Z", "updated_at": "2020-02-21T19:05:02Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:05:02Z", "revision_number": 0, "id": "83d8e28f-c6cd-49de-8848-9765461c1f30", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:05:02Z", "security_group_id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:05:02Z", "revision_number": 0, "id": "ed97726d-9352-4b3a-b5a5-0714eeb26d97", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:05:02Z", "security_group_id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-2"}, {"description": "Default security group", "tags": [], "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "created_at": "2020-02-21T15:46:58Z", "updated_at": "2020-02-21T15:46:58Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "1431a05a-d8d1-4958-ae2a-afc04ac78962", "remote_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv6", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "1ad96301-9aed-40d6-adec-fef1a45c7fed", "remote_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv4", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "77f93082-0ba3-468b-8c25-42a936001a53", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv6", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "7dfab90e-f596-49e6-836c-039aec65a38a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv4", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}], "revision_number": 1, "project_id": "1a10390d4a0a4cdbad40154220c8e211", "id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "name": "default"}]} 2020-02-21 20:14:28,850 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json used request id req-a2ceef7f-59bd-4b17-bc61-88ac49a95fd2 2020-02-21 20:14:28,850 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.security-groups in 0.9343686103820801s 2020-02-21 20:14:28,851 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json used request id req-a2ceef7f-59bd-4b17-bc61-88ac49a95fd2 2020-02-21 20:14:28,857 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:28,877 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,101 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 15003 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:28 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-5b82d48e-6ff6-4156-8052-73020102673a 2020-02-21 20:14:29,101 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-FlavorsServiceProfileExtRbacTest-1793541721-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/0e6752875ccb40bd924f7e57799dd7ed"}, "tags": [], "enabled": true, "id": "0e6752875ccb40bd924f7e57799dd7ed", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FlavorsServiceProfileExtRbacTest-1793541721"}, {"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,102 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-5b82d48e-6ff6-4156-8052-73020102673a 2020-02-21 20:14:29,102 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.2265796661376953s 2020-02-21 20:14:29,102 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-5b82d48e-6ff6-4156-8052-73020102673a 2020-02-21 20:14:29,122 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,125 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,215 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 15003 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-64a21e43-bdca-431e-a738-f0d8302c477c 2020-02-21 20:14:29,224 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-FlavorsServiceProfileExtRbacTest-1793541721-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/0e6752875ccb40bd924f7e57799dd7ed"}, "tags": [], "enabled": true, "id": "0e6752875ccb40bd924f7e57799dd7ed", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FlavorsServiceProfileExtRbacTest-1793541721"}, {"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,224 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-64a21e43-bdca-431e-a738-f0d8302c477c 2020-02-21 20:14:29,224 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.10172319412231445s 2020-02-21 20:14:29,224 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-64a21e43-bdca-431e-a738-f0d8302c477c 2020-02-21 20:14:29,239 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,243 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,316 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 15003 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-405d14e5-8371-43b9-a98a-ab934969c15a 2020-02-21 20:14:29,317 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-FlavorsServiceProfileExtRbacTest-1793541721-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/0e6752875ccb40bd924f7e57799dd7ed"}, "tags": [], "enabled": true, "id": "0e6752875ccb40bd924f7e57799dd7ed", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FlavorsServiceProfileExtRbacTest-1793541721"}, {"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,318 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-405d14e5-8371-43b9-a98a-ab934969c15a 2020-02-21 20:14:29,318 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.07837486267089844s 2020-02-21 20:14:29,319 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-405d14e5-8371-43b9-a98a-ab934969c15a 2020-02-21 20:14:29,335 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,338 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,404 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3b6f24e7-6864-4005-aa15-a8bcea9b7238 2020-02-21 20:14:29,405 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,405 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3b6f24e7-6864-4005-aa15-a8bcea9b7238 2020-02-21 20:14:29,405 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.07013678550720215s 2020-02-21 20:14:29,406 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3b6f24e7-6864-4005-aa15-a8bcea9b7238 2020-02-21 20:14:29,418 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,420 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,579 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-c568d360-10b6-44e0-8de1-74b6a5c02f4a 2020-02-21 20:14:29,580 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,580 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-c568d360-10b6-44e0-8de1-74b6a5c02f4a 2020-02-21 20:14:29,580 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.16267848014831543s 2020-02-21 20:14:29,581 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-c568d360-10b6-44e0-8de1-74b6a5c02f4a 2020-02-21 20:14:29,591 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,593 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,708 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-95217298-487f-495f-ad24-95a9490547d9 2020-02-21 20:14:29,709 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,709 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-95217298-487f-495f-ad24-95a9490547d9 2020-02-21 20:14:29,709 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.11798906326293945s 2020-02-21 20:14:29,709 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-95217298-487f-495f-ad24-95a9490547d9 2020-02-21 20:14:29,719 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,721 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,834 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-55836c9c-82df-4a7f-a6df-653aae696b99 2020-02-21 20:14:29,836 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,836 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-55836c9c-82df-4a7f-a6df-653aae696b99 2020-02-21 20:14:29,836 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.11668586730957031s 2020-02-21 20:14:29,837 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-55836c9c-82df-4a7f-a6df-653aae696b99 2020-02-21 20:14:29,852 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,854 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,919 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3b447c6a-779c-4bcf-8e5f-e3f4c4bb317f 2020-02-21 20:14:29,920 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,920 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3b447c6a-779c-4bcf-8e5f-e3f4c4bb317f 2020-02-21 20:14:29,920 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.06843709945678711s 2020-02-21 20:14:29,921 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3b447c6a-779c-4bcf-8e5f-e3f4c4bb317f 2020-02-21 20:14:29,933 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:29,935 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:29,994 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:29 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-b06ce507-9ced-42f0-8e5d-49b343544f76 2020-02-21 20:14:29,995 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:29,995 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-b06ce507-9ced-42f0-8e5d-49b343544f76 2020-02-21 20:14:29,995 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.0621800422668457s 2020-02-21 20:14:29,996 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-b06ce507-9ced-42f0-8e5d-49b343544f76 2020-02-21 20:14:30,006 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,008 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,065 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-7c1f93db-c93f-4d03-9a1f-6d6f062acfc5 2020-02-21 20:14:30,066 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:30,066 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-7c1f93db-c93f-4d03-9a1f-6d6f062acfc5 2020-02-21 20:14:30,066 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.05977344512939453s 2020-02-21 20:14:30,067 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-7c1f93db-c93f-4d03-9a1f-6d6f062acfc5 2020-02-21 20:14:30,077 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,079 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,146 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-859d5cfc-b3cd-488e-bf77-f7d2b5d97ee4 2020-02-21 20:14:30,148 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:30,148 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-859d5cfc-b3cd-488e-bf77-f7d2b5d97ee4 2020-02-21 20:14:30,148 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.07128357887268066s 2020-02-21 20:14:30,149 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-859d5cfc-b3cd-488e-bf77-f7d2b5d97ee4 2020-02-21 20:14:30,164 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,167 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,228 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-c3f3ee6d-5495-4697-98f5-0247f172c7cc 2020-02-21 20:14:30,228 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:30,229 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-c3f3ee6d-5495-4697-98f5-0247f172c7cc 2020-02-21 20:14:30,229 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.06421709060668945s 2020-02-21 20:14:30,229 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-c3f3ee6d-5495-4697-98f5-0247f172c7cc 2020-02-21 20:14:30,237 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,239 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,313 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14613 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3084cfd2-04eb-4c76-b938-51927bb0e3ed 2020-02-21 20:14:30,314 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}, {"is_domain": false, "description": "tempest-ImageResourceTypesRbacTest-613673780-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ffecb634d7444dbf97be51426c5b9e18"}, "tags": [], "enabled": true, "id": "ffecb634d7444dbf97be51426c5b9e18", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageResourceTypesRbacTest-613673780"}]} 2020-02-21 20:14:30,314 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3084cfd2-04eb-4c76-b938-51927bb0e3ed 2020-02-21 20:14:30,315 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.07722187042236328s 2020-02-21 20:14:30,315 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-3084cfd2-04eb-4c76-b938-51927bb0e3ed 2020-02-21 20:14:30,327 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,328 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,392 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14237 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-5985f567-af73-48c8-8175-4b6e6d52c313 2020-02-21 20:14:30,393 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}]} 2020-02-21 20:14:30,393 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-5985f567-af73-48c8-8175-4b6e6d52c313 2020-02-21 20:14:30,394 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.06671571731567383s 2020-02-21 20:14:30,394 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-5985f567-af73-48c8-8175-4b6e6d52c313 2020-02-21 20:14:30,415 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,422 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,559 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 14237 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-1dcd981e-fa94-4739-b967-f8a9cdff0088 2020-02-21 20:14:30,560 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-ServiceProvidersRbacTest-1491573120-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/300efa1438f6466fb6bad6c5df6deec3"}, "tags": [], "enabled": true, "id": "300efa1438f6466fb6bad6c5df6deec3", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProvidersRbacTest-1491573120"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-ImageNamespacesRbacTest-582677051-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b2b56a7aef904d399cfd57d250e1b770"}, "tags": [], "enabled": true, "id": "b2b56a7aef904d399cfd57d250e1b770", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesRbacTest-582677051"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}]} 2020-02-21 20:14:30,560 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-1dcd981e-fa94-4739-b967-f8a9cdff0088 2020-02-21 20:14:30,560 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.14063191413879395s 2020-02-21 20:14:30,561 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-1dcd981e-fa94-4739-b967-f8a9cdff0088 2020-02-21 20:14:30,576 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.users 2020-02-21 20:14:30,578 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/users -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,660 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 17336 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-3c915465-e213-4b0e-9907-a6a1ae429ffc 2020-02-21 20:14:30,661 - keystoneauth.session - DEBUG - RESP BODY: {"users": [{"password_expires_at": null, "name": "admin", "links": {"self": "http://172.30.12.85/identity/v3/users/b24f76739270471bb64eebf6e3646601"}, "domain_id": "default", "enabled": true, "id": "b24f76739270471bb64eebf6e3646601", "options": {}}, {"name": "demo", "links": {"self": "http://172.30.12.85/identity/v3/users/e16576aaf1ae4ca1a1768987d879beaf"}, "domain_id": "default", "enabled": true, "options": {}, "id": "e16576aaf1ae4ca1a1768987d879beaf", "email": "demo@example.com", "password_expires_at": null}, {"name": "alt_demo", "links": {"self": "http://172.30.12.85/identity/v3/users/8dd6688693b5400cb1045432f780a4d3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8dd6688693b5400cb1045432f780a4d3", "email": "alt_demo@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "nova", "links": {"self": "http://172.30.12.85/identity/v3/users/b0afe79fc7f54700a1679e7d8b885889"}, "domain_id": "default", "enabled": true, "id": "b0afe79fc7f54700a1679e7d8b885889", "options": {}}, {"password_expires_at": null, "name": "glance", "links": {"self": "http://172.30.12.85/identity/v3/users/68a178ee183746dcb0317b4e443e41cc"}, "domain_id": "default", "enabled": true, "id": "68a178ee183746dcb0317b4e443e41cc", "options": {}}, {"password_expires_at": null, "name": "glance-swift", "links": {"self": "http://172.30.12.85/identity/v3/users/cdc1aa602170452a96f907f4fa97b86f"}, "domain_id": "default", "enabled": true, "id": "cdc1aa602170452a96f907f4fa97b86f", "options": {}}, {"password_expires_at": null, "name": "cinder", "links": {"self": "http://172.30.12.85/identity/v3/users/c133842e0d5c4ac49a23a7da4363abd0"}, "domain_id": "default", "enabled": true, "id": "c133842e0d5c4ac49a23a7da4363abd0", "options": {}}, {"password_expires_at": null, "name": "neutron", "links": {"self": "http://172.30.12.85/identity/v3/users/973956b416c64ef2b57f493205a7bdd8"}, "domain_id": "default", "enabled": true, "id": "973956b416c64ef2b57f493205a7bdd8", "options": {}}, {"password_expires_at": null, "name": "swift", "links": {"self": "http://172.30.12.85/identity/v3/users/628e5f79587e412a96f6bc9753f9ffde"}, "domain_id": "default", "enabled": true, "id": "628e5f79587e412a96f6bc9753f9ffde", "options": {}}, {"name": "swiftusertest1", "links": {"self": "http://172.30.12.85/identity/v3/users/cc90d2b387964cb28dffa5da293ab9b3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cc90d2b387964cb28dffa5da293ab9b3", "email": "test@example.com", "password_expires_at": null}, {"name": "swiftusertest3", "links": {"self": "http://172.30.12.85/identity/v3/users/5e80a77ccabc42c792a8016d4f85308d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "5e80a77ccabc42c792a8016d4f85308d", "email": "test3@example.com", "password_expires_at": null}, {"name": "swiftusertest2", "links": {"self": "http://172.30.12.85/identity/v3/users/f6398227b24941bc9895461eca62b565"}, "domain_id": "default", "enabled": true, "options": {}, "id": "f6398227b24941bc9895461eca62b565", "email": "test2@example.com", "password_expires_at": null}, {"name": "swiftusertest4", "links": {"self": "http://172.30.12.85/identity/v3/users/808ad2796ff34bf58b18e0d605a44a8f"}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "enabled": true, "options": {}, "id": "808ad2796ff34bf58b18e0d605a44a8f", "email": "test4@example.com", "password_expires_at": null}, {"password_expires_at": null, "name": "placement", "links": {"self": "http://172.30.12.85/identity/v3/users/dabc1f359741415580e7e860a1cb44e1"}, "domain_id": "default", "enabled": true, "id": "dabc1f359741415580e7e860a1cb44e1", "options": {}}, {"password_expires_at": null, "name": "heat", "links": {"self": "http://172.30.12.85/identity/v3/users/40c676d7e781438785527e2ad13f9516"}, "domain_id": "default", "enabled": true, "id": "40c676d7e781438785527e2ad13f9516", "options": {}}, {"password_expires_at": null, "name": "heat_domain_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/d6b31904cd8e42d4bfb4702fc7ea7d9c"}, "domain_id": "e9cfe98ff983445dabaabfd0b0395735", "enabled": true, "id": "d6b31904cd8e42d4bfb4702fc7ea7d9c", "options": {}}, {"name": "barbican", "links": {"self": "http://172.30.12.85/identity/v3/users/0c600d0f83884bd79b6884495248ec12"}, "domain_id": "default", "enabled": true, "options": {}, "default_project_id": "e479343d5fff47bb96822a0889fa3366", "id": "0c600d0f83884bd79b6884495248ec12", "email": "barbican@example.com", "password_expires_at": null}, {"name": "service-admin", "links": {"self": "http://172.30.12.85/identity/v3/users/eb7c4303cff847d39b194ada83eed74d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "eb7c4303cff847d39b194ada83eed74d", "email": "service-admin@example.com", "password_expires_at": null}, {"name": "project_a_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/c501a9233eaf4ecebee0ddbbc8fc0605"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c501a9233eaf4ecebee0ddbbc8fc0605", "email": "admin_a@example.net", "password_expires_at": null}, {"name": "project_a_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/4c1f3b1f31ca4a2ab7e69329ba681b52"}, "domain_id": "default", "enabled": true, "options": {}, "id": "4c1f3b1f31ca4a2ab7e69329ba681b52", "email": "creator_a@example.net", "password_expires_at": null}, {"name": "project_a_creator_2", "links": {"self": "http://172.30.12.85/identity/v3/users/be811a0dfecb46dc8e4bf99962a1d264"}, "domain_id": "default", "enabled": true, "options": {}, "id": "be811a0dfecb46dc8e4bf99962a1d264", "email": "creator2_a@example.net", "password_expires_at": null}, {"name": "project_a_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/c48bb77a8869493f9fbba65147a19cf0"}, "domain_id": "default", "enabled": true, "options": {}, "id": "c48bb77a8869493f9fbba65147a19cf0", "email": "observer_a@example.net", "password_expires_at": null}, {"name": "project_a_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/fdfcbb1acd984416972bf182b98eb4e5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "fdfcbb1acd984416972bf182b98eb4e5", "email": "auditor_a@example.net", "password_expires_at": null}, {"name": "project_b_admin", "links": {"self": "http://172.30.12.85/identity/v3/users/3ed6039747d94d479baf50af6c767d6f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "3ed6039747d94d479baf50af6c767d6f", "email": "admin_b@example.net", "password_expires_at": null}, {"name": "project_b_creator", "links": {"self": "http://172.30.12.85/identity/v3/users/48e5540d59e4456dbabbc8555793e813"}, "domain_id": "default", "enabled": true, "options": {}, "id": "48e5540d59e4456dbabbc8555793e813", "email": "creator_b@example.net", "password_expires_at": null}, {"name": "project_b_observer", "links": {"self": "http://172.30.12.85/identity/v3/users/8546bb44d02b4a11846e260d902431f7"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8546bb44d02b4a11846e260d902431f7", "email": "observer_b@example.net", "password_expires_at": null}, {"name": "project_b_auditor", "links": {"self": "http://172.30.12.85/identity/v3/users/220a6f918a8447848316ae5d0eb1f534"}, "domain_id": "default", "enabled": true, "options": {}, "id": "220a6f918a8447848316ae5d0eb1f534", "email": "auditor_b@example.net", "password_expires_at": null}, {"name": "juju_epc-user_64dbbf47-6096-48af-b335-651ad4c27a64", "links": {"self": "http://172.30.12.85/identity/v3/users/9436b1f8182740268995b89743a446fb"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "9436b1f8182740268995b89743a446fb", "domain_id": "default", "password_expires_at": null}, {"name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139", "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "domain_id": "default", "password_expires_at": null}, {"name": "patrole-user_c9449aea-7375-422f-b76a-ec410c1f47ef", "links": {"self": "http://172.30.12.85/identity/v3/users/dfbbca04a79549b8b85136a1ca8f682e"}, "description": null, "enabled": true, "email": null, "options": {}, "id": "dfbbca04a79549b8b85136a1ca8f682e", "domain_id": "default", "password_expires_at": null}, {"name": "tempest-DscpMarkingRuleExtRbacTest-197535366", "links": {"self": "http://172.30.12.85/identity/v3/users/83ab829bbd7b482fb16c12593c7251a1"}, "domain_id": "default", "enabled": true, "options": {}, "id": "83ab829bbd7b482fb16c12593c7251a1", "project_id": "539a10b4bbbb47eaa261111b6bc6500a", "email": "tempest-DscpMarkingRuleExtRbacTest-174985222@example.com", "password_expires_at": null}, {"name": "tempest-FloatingIpsRbacTest-1152347205", "links": {"self": "http://172.30.12.85/identity/v3/users/53a7f8211ae04e53996e90a41d3576e3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "53a7f8211ae04e53996e90a41d3576e3", "project_id": "bbce078e7d7448af9a4e541eea454192", "email": "tempest-FloatingIpsRbacTest-667581393@example.com", "password_expires_at": null}, {"name": "tempest-NetworkSegmentsRbacTest-534289212", "links": {"self": "http://172.30.12.85/identity/v3/users/a1ef4bd0a2f1429e9bf6ded431b56fd1"}, "domain_id": "default", "enabled": true, "options": {}, "id": "a1ef4bd0a2f1429e9bf6ded431b56fd1", "project_id": "63285b0d00834e3d85e2f995d3172d99", "email": "tempest-NetworkSegmentsRbacTest-278246082@example.com", "password_expires_at": null}, {"name": "tempest-ServiceProfileExtRbacTest-1931951659", "links": {"self": "http://172.30.12.85/identity/v3/users/cf7c901d12184fc7ad1c464a3562c06b"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cf7c901d12184fc7ad1c464a3562c06b", "project_id": "12a0e05c922a4e2fadaf87655f1be029", "email": "tempest-ServiceProfileExtRbacTest-1519902033@example.com", "password_expires_at": null}, {"name": "tempest-BasicOperationsImagesRbacTest-196459476", "links": {"self": "http://172.30.12.85/identity/v3/users/369bc4cba28446bc8ac605077bad376f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "369bc4cba28446bc8ac605077bad376f", "project_id": "563393477c434c30ba3409900beeff63", "email": "tempest-BasicOperationsImagesRbacTest-1749493336@example.com", "password_expires_at": null}, {"name": "tempest-AddressScopeExtRbacTest-1013226044", "links": {"self": "http://172.30.12.85/identity/v3/users/eac68694303942dc980a2c8635495a9d"}, "domain_id": "default", "enabled": true, "options": {}, "id": "eac68694303942dc980a2c8635495a9d", "project_id": "dd7bface585b4e559a26e7b5c9f174d9", "email": "tempest-AddressScopeExtRbacTest-46990890@example.com", "password_expires_at": null}, {"name": "tempest-QosExtRbacTest-1855154360", "links": {"self": "http://172.30.12.85/identity/v3/users/8f2f64942e814424bc5264f62f827d5f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "8f2f64942e814424bc5264f62f827d5f", "project_id": "f6f95180001448fda82e8f222c16a5e5", "email": "tempest-QosExtRbacTest-1104499109@example.com", "password_expires_at": null}, {"name": "tempest-RbacPoliciesExtRbacTest-597031165", "links": {"self": "http://172.30.12.85/identity/v3/users/cd0eeeecc8364e53a4db55e93984da88"}, "domain_id": "default", "enabled": true, "options": {}, "id": "cd0eeeecc8364e53a4db55e93984da88", "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "email": "tempest-RbacPoliciesExtRbacTest-1548857961@example.com", "password_expires_at": null}, {"name": "tempest-NetworksRbacTest-2041264881", "links": {"self": "http://172.30.12.85/identity/v3/users/478b5ac7b1ec485a879e46bb4cb9f9c5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "478b5ac7b1ec485a879e46bb4cb9f9c5", "project_id": "c009ae6fe00c4f9dab5b8e63be937e55", "email": "tempest-NetworksRbacTest-1240863032@example.com", "password_expires_at": null}, {"name": "tempest-ImagesMemberRbacTest-1887493901", "links": {"self": "http://172.30.12.85/identity/v3/users/4042969d39fa4e278f419280c18641d4"}, "domain_id": "default", "enabled": true, "options": {}, "id": "4042969d39fa4e278f419280c18641d4", "project_id": "626b6bba252349a2ac92af361b7d3a5c", "email": "tempest-ImagesMemberRbacTest-566687744@example.com", "password_expires_at": null}, {"name": "tempest-SubnetPoolsRbacTest-1298592057", "links": {"self": "http://172.30.12.85/identity/v3/users/084b16e02e6d48a8b0cf466a408d41d3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "084b16e02e6d48a8b0cf466a408d41d3", "project_id": "b3e34d0057dd47cf89cf6f0c884a2be7", "email": "tempest-SubnetPoolsRbacTest-1300303042@example.com", "password_expires_at": null}, {"name": "tempest-SecGroupRbacTest-173742378", "links": {"self": "http://172.30.12.85/identity/v3/users/aafe92f977ee46c98256604d059b5154"}, "domain_id": "default", "enabled": true, "options": {}, "id": "aafe92f977ee46c98256604d059b5154", "project_id": "86527d686fa84b39815b22d0c6247ae6", "email": "tempest-SecGroupRbacTest-154128411@example.com", "password_expires_at": null}, {"name": "tempest-TrunksSubportsExtRbacTest-1726535451", "links": {"self": "http://172.30.12.85/identity/v3/users/6c4105cdf7ea4b27a16de65f9e587715"}, "domain_id": "default", "enabled": true, "options": {}, "id": "6c4105cdf7ea4b27a16de65f9e587715", "project_id": "22ca4592c4fb458aa101fc57e9724531", "email": "tempest-TrunksSubportsExtRbacTest-1934934754@example.com", "password_expires_at": null}, {"name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936", "links": {"self": "http://172.30.12.85/identity/v3/users/232e5001e7814da6827336539b116db3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "232e5001e7814da6827336539b116db3", "project_id": "3a4af0dd87004013a006abffa3ee803b", "email": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-865424140@example.com", "password_expires_at": null}, {"name": "tempest-NamespaceTagsRbacTest-1250457428", "links": {"self": "http://172.30.12.85/identity/v3/users/a20e3614745f42a48479883020772da3"}, "domain_id": "default", "enabled": true, "options": {}, "id": "a20e3614745f42a48479883020772da3", "project_id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "email": "tempest-NamespaceTagsRbacTest-523402446@example.com", "password_expires_at": null}, {"name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326", "links": {"self": "http://172.30.12.85/identity/v3/users/1d9bf971572042b1b3096aebe741bb1f"}, "domain_id": "default", "enabled": true, "options": {}, "id": "1d9bf971572042b1b3096aebe741bb1f", "project_id": "94b9489916d04beeb560ebf3a6e1dafd", "email": "tempest-PolicyBandwidthLimitRuleExtRbacTest-1959167228@example.com", "password_expires_at": null}, {"name": "tempest-TrunksExtRbacTest-1944378914", "links": {"self": "http://172.30.12.85/identity/v3/users/1a2a0e0a0b9f4031aad9380d6a333815"}, "domain_id": "default", "enabled": true, "options": {}, "id": "1a2a0e0a0b9f4031aad9380d6a333815", "project_id": "e1143eef336d43e0bb037b224f8560e1", "email": "tempest-TrunksExtRbacTest-1765202219@example.com", "password_expires_at": null}, {"name": "tempest-SubnetsRbacTest-61818755", "links": {"self": "http://172.30.12.85/identity/v3/users/e1e28c397f23472e8754198b891912f5"}, "domain_id": "default", "enabled": true, "options": {}, "id": "e1e28c397f23472e8754198b891912f5", "project_id": "ec90059df02c44d9b2c092e475022b96", "email": "tempest-SubnetsRbacTest-181231180@example.com", "password_expires_at": null}, {"name": "tempest-RouterRbacTest-1883656077", "links": {"self": "http://172.30.12.85/identity/v3/users/00e9e8abd57d49ecb841dae18ad4a770"}, "domain_id": "default", "enabled": true, "options": {}, "id": "00e9e8abd57d49ecb841dae18ad4a770", "project_id": "cac386b78ca64bd4b01a3355596f1dea", "email": "tempest-RouterRbacTest-186166553@example.com", "password_expires_at": null}, {"name": "tempest-PortsRbacTest-2016896943", "links": {"self": "http://172.30.12.85/identity/v3/users/2fb37da4b86b4b319bf154c65a760588"}, "domain_id": "default", "enabled": true, "options": {}, "id": "2fb37da4b86b4b319bf154c65a760588", "project_id": "a797d657ad87499fa042531f1d75fc69", "email": "tempest-PortsRbacTest-614075610@example.com", "password_expires_at": null}, {"name": "tempest-ImageNamespacesObjectsRbacTest-647025704", "links": {"self": "http://172.30.12.85/identity/v3/users/bcee2867093247fbb8ca64faffe838c8"}, "domain_id": "default", "enabled": true, "options": {}, "id": "bcee2867093247fbb8ca64faffe838c8", "project_id": "a14e21fd3ff34259badaf055a0676a8d", "email": "tempest-ImageNamespacesObjectsRbacTest-1424014896@example.com", "password_expires_at": null}, {"name": "tempest-NamespacesPropertyRbacTest-611688521", "links": {"self": "http://172.30.12.85/identity/v3/users/5e980640833d4ec7898f16e21babd551"}, "domain_id": "default", "enabled": true, "options": {}, "id": "5e980640833d4ec7898f16e21babd551", "project_id": "81904ec81e0448d58c57c1210aa79461", "email": "tempest-NamespacesPropertyRbacTest-420232795@example.com", "password_expires_at": null}, {"name": "tempest-ImagesMemberRbacTest-906301792", "links": {"self": "http://172.30.12.85/identity/v3/users/bcea7c13c0d943c1b82f8c525c5e9a28"}, "domain_id": "default", "enabled": true, "options": {}, "id": "bcea7c13c0d943c1b82f8c525c5e9a28", "project_id": "e4290ee99188402f84ac0d4a8d750441", "email": "tempest-ImagesMemberRbacTest-633369766@example.com", "password_expires_at": null}], "links": {"self": "http://172.30.12.85/identity/v3/users", "previous": null, "next": null}} 2020-02-21 20:14:30,661 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users used request id req-3c915465-e213-4b0e-9907-a6a1ae429ffc 2020-02-21 20:14:30,661 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.users in 0.08517241477966309s 2020-02-21 20:14:30,661 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users used request id req-3c915465-e213-4b0e-9907-a6a1ae429ffc 2020-02-21 20:14:30,668 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.users 2020-02-21 20:14:30,669 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,798 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 334 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-4e895b6b-e7f4-405c-abac-9ae1f2dd12d1 2020-02-21 20:14:30,798 - keystoneauth.session - DEBUG - RESP BODY: {"user": {"password_expires_at": null, "links": {"self": "http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d"}, "domain_id": "default", "description": null, "enabled": true, "options": {}, "id": "e98031d447fe4df7acb26a58a9646e4d", "email": null, "name": "neutron_trunk-user_f7f9587f-7171-4f18-8f05-6b1018bd5139"}} 2020-02-21 20:14:30,799 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d used request id req-4e895b6b-e7f4-405c-abac-9ae1f2dd12d1 2020-02-21 20:14:30,799 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.users in 0.13098716735839844s 2020-02-21 20:14:30,799 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d used request id req-4e895b6b-e7f4-405c-abac-9ae1f2dd12d1 2020-02-21 20:14:30,799 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.DELETE.users 2020-02-21 20:14:30,801 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:30,956 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-d6ed6748-4d0a-453d-bd94-a461408111cf 2020-02-21 20:14:30,956 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:30,956 - keystoneauth.session - DEBUG - DELETE call to identity for http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d used request id req-d6ed6748-4d0a-453d-bd94-a461408111cf 2020-02-21 20:14:30,956 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.DELETE.users in 0.15691828727722168s 2020-02-21 20:14:30,956 - shade.request_ids - DEBUG - DELETE call to identity for http://172.30.12.85/identity/v3/users/e98031d447fe4df7acb26a58a9646e4d used request id req-d6ed6748-4d0a-453d-bd94-a461408111cf 2020-02-21 20:14:30,963 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.GET.projects 2020-02-21 20:14:30,966 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85/identity/v3/projects -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:31,084 - keystoneauth.session - DEBUG - RESP: [200] Connection: close Content-Length: 13493 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:30 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-603463f9-0f85-4bd7-8a26-4d7391776791 2020-02-21 20:14:31,085 - keystoneauth.session - DEBUG - RESP BODY: {"links": {"self": "http://172.30.12.85/identity/v3/projects", "previous": null, "next": null}, "projects": [{"is_domain": false, "description": "tempest-ServiceProfileExtRbacTest-1931951659-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/12a0e05c922a4e2fadaf87655f1be029"}, "tags": [], "enabled": true, "id": "12a0e05c922a4e2fadaf87655f1be029", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ServiceProfileExtRbacTest-1931951659"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-563669903-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/1a10390d4a0a4cdbad40154220c8e211"}, "tags": [], "enabled": true, "id": "1a10390d4a0a4cdbad40154220c8e211", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-563669903"}, {"is_domain": false, "description": "tempest-TrunksSubportsExtRbacTest-1726535451-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/22ca4592c4fb458aa101fc57e9724531"}, "tags": [], "enabled": true, "id": "22ca4592c4fb458aa101fc57e9724531", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksSubportsExtRbacTest-1726535451"}, {"is_domain": false, "description": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a4af0dd87004013a006abffa3ee803b"}, "tags": [], "enabled": true, "id": "3a4af0dd87004013a006abffa3ee803b", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyMinimumBandwidthRuleExtRbacTest-2072215936"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/3a550fb8c83e4161886059d8b8d86710"}, "tags": [], "enabled": true, "id": "3a550fb8c83e4161886059d8b8d86710", "parent_id": "default", "options": {}, "domain_id": "default", "name": "demo"}, {"is_domain": false, "description": "Created by OPNFV Functest: neutron_trunk", "links": {"self": "http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d"}, "tags": [], "enabled": true, "id": "3bb960f3511b4610bdd88acf066f912d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "neutron_trunk-project_f7f9587f-7171-4f18-8f05-6b1018bd5139"}, {"is_domain": false, "description": "Bootstrap project for initializing the cloud.", "links": {"self": "http://172.30.12.85/identity/v3/projects/457b822374de45b5a7624827c06b5ff5"}, "tags": [], "enabled": true, "id": "457b822374de45b5a7624827c06b5ff5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "admin"}, {"is_domain": false, "description": "tempest-DscpMarkingRuleExtRbacTest-197535366-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/539a10b4bbbb47eaa261111b6bc6500a"}, "tags": [], "enabled": true, "id": "539a10b4bbbb47eaa261111b6bc6500a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-DscpMarkingRuleExtRbacTest-197535366"}, {"is_domain": false, "description": "tempest-BasicOperationsImagesRbacTest-196459476-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/563393477c434c30ba3409900beeff63"}, "tags": [], "enabled": true, "id": "563393477c434c30ba3409900beeff63", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-BasicOperationsImagesRbacTest-196459476"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-1887493901-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/626b6bba252349a2ac92af361b7d3a5c"}, "tags": [], "enabled": true, "id": "626b6bba252349a2ac92af361b7d3a5c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-1887493901"}, {"is_domain": false, "description": "tempest-NetworkSegmentsRbacTest-534289212-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/63285b0d00834e3d85e2f995d3172d99"}, "tags": [], "enabled": true, "id": "63285b0d00834e3d85e2f995d3172d99", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworkSegmentsRbacTest-534289212"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/71d71f8033d8490c853997196a9589ca"}, "tags": [], "enabled": true, "id": "71d71f8033d8490c853997196a9589ca", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest2"}, {"is_domain": false, "description": "tempest-MultipleCreateTestJSON-1010184464-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/7b343734bc9049139d7e4a1fa7dcaae8"}, "tags": [], "enabled": true, "id": "7b343734bc9049139d7e4a1fa7dcaae8", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-MultipleCreateTestJSON-1010184464"}, {"is_domain": false, "description": "tempest-NamespacesPropertyRbacTest-611688521-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/81904ec81e0448d58c57c1210aa79461"}, "tags": [], "enabled": true, "id": "81904ec81e0448d58c57c1210aa79461", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespacesPropertyRbacTest-611688521"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/8576ba69f4014ebaab21382989333b56"}, "tags": [], "enabled": true, "id": "8576ba69f4014ebaab21382989333b56", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_b"}, {"is_domain": false, "description": "tempest-SecGroupRbacTest-173742378-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/86527d686fa84b39815b22d0c6247ae6"}, "tags": [], "enabled": true, "id": "86527d686fa84b39815b22d0c6247ae6", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SecGroupRbacTest-173742378"}, {"is_domain": false, "description": "Created by OPNFV Functest: juju_epc", "links": {"self": "http://172.30.12.85/identity/v3/projects/89f0296fc0c0431e81c8370bb90781d7"}, "tags": [], "enabled": true, "id": "89f0296fc0c0431e81c8370bb90781d7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "juju_epc-project_64dbbf47-6096-48af-b335-651ad4c27a64"}, {"is_domain": false, "description": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/94b9489916d04beeb560ebf3a6e1dafd"}, "tags": [], "enabled": true, "id": "94b9489916d04beeb560ebf3a6e1dafd", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PolicyBandwidthLimitRuleExtRbacTest-839177326"}, {"is_domain": false, "description": "tempest-NamespaceTagsRbacTest-1250457428-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a04c502d4d8a4bf7aa0276cdd2c4e38e"}, "tags": [], "enabled": true, "id": "a04c502d4d8a4bf7aa0276cdd2c4e38e", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NamespaceTagsRbacTest-1250457428"}, {"is_domain": false, "description": "tempest-ImageNamespacesObjectsRbacTest-647025704-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a14e21fd3ff34259badaf055a0676a8d"}, "tags": [], "enabled": true, "id": "a14e21fd3ff34259badaf055a0676a8d", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImageNamespacesObjectsRbacTest-647025704"}, {"is_domain": false, "description": "tempest-PortsRbacTest-2016896943-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/a797d657ad87499fa042531f1d75fc69"}, "tags": [], "enabled": true, "id": "a797d657ad87499fa042531f1d75fc69", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-PortsRbacTest-2016896943"}, {"is_domain": false, "description": "tempest-SubnetPoolsRbacTest-1298592057-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/b3e34d0057dd47cf89cf6f0c884a2be7"}, "tags": [], "enabled": true, "id": "b3e34d0057dd47cf89cf6f0c884a2be7", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetPoolsRbacTest-1298592057"}, {"is_domain": false, "description": "tempest-FloatingIpsRbacTest-1152347205-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/bbce078e7d7448af9a4e541eea454192"}, "tags": [], "enabled": true, "id": "bbce078e7d7448af9a4e541eea454192", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-FloatingIpsRbacTest-1152347205"}, {"is_domain": false, "description": "tempest-NetworksRbacTest-2041264881-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/c009ae6fe00c4f9dab5b8e63be937e55"}, "tags": [], "enabled": true, "id": "c009ae6fe00c4f9dab5b8e63be937e55", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-NetworksRbacTest-2041264881"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c277454368044eaa834d930fbb3ec988"}, "tags": [], "enabled": true, "id": "c277454368044eaa834d930fbb3ec988", "parent_id": "default", "options": {}, "domain_id": "default", "name": "swiftprojecttest1"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/c719314efd7148a5963dc154544dc71a"}, "tags": [], "enabled": true, "id": "c719314efd7148a5963dc154544dc71a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "invisible_to_admin"}, {"is_domain": false, "description": "tempest-RouterRbacTest-1883656077-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cac386b78ca64bd4b01a3355596f1dea"}, "tags": [], "enabled": true, "id": "cac386b78ca64bd4b01a3355596f1dea", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RouterRbacTest-1883656077"}, {"is_domain": false, "description": "tempest-RbacPoliciesExtRbacTest-597031165-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, "tags": [], "enabled": true, "id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-RbacPoliciesExtRbacTest-597031165"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/d0007ed39e7b4047a509eeb83b7e385c"}, "tags": [], "enabled": true, "id": "d0007ed39e7b4047a509eeb83b7e385c", "parent_id": "default", "options": {}, "domain_id": "default", "name": "alt_demo"}, {"is_domain": false, "description": "tempest-AddressScopeExtRbacTest-1013226044-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/dd7bface585b4e559a26e7b5c9f174d9"}, "tags": [], "enabled": true, "id": "dd7bface585b4e559a26e7b5c9f174d9", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-AddressScopeExtRbacTest-1013226044"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/decc7053773b4df7ad4d29dbc08bc6dd"}, "tags": [], "enabled": true, "id": "decc7053773b4df7ad4d29dbc08bc6dd", "parent_id": "a44f5c1830f344f79a8e1106566b695b", "options": {}, "domain_id": "a44f5c1830f344f79a8e1106566b695b", "name": "swiftprojecttest4"}, {"is_domain": false, "description": "tempest-TrunksExtRbacTest-1944378914-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e1143eef336d43e0bb037b224f8560e1"}, "tags": [], "enabled": true, "id": "e1143eef336d43e0bb037b224f8560e1", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-TrunksExtRbacTest-1944378914"}, {"is_domain": false, "description": "tempest-ImagesMemberRbacTest-906301792-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/e4290ee99188402f84ac0d4a8d750441"}, "tags": [], "enabled": true, "id": "e4290ee99188402f84ac0d4a8d750441", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-ImagesMemberRbacTest-906301792"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/e479343d5fff47bb96822a0889fa3366"}, "tags": [], "enabled": true, "id": "e479343d5fff47bb96822a0889fa3366", "parent_id": "default", "options": {}, "domain_id": "default", "name": "service"}, {"is_domain": false, "description": "tempest-SubnetsRbacTest-61818755-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/ec90059df02c44d9b2c092e475022b96"}, "tags": [], "enabled": true, "id": "ec90059df02c44d9b2c092e475022b96", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-SubnetsRbacTest-61818755"}, {"is_domain": false, "description": "Created by OPNFV Functest: patrole", "links": {"self": "http://172.30.12.85/identity/v3/projects/f0ae165616b14cf5990f6671a5206457"}, "tags": [], "enabled": true, "id": "f0ae165616b14cf5990f6671a5206457", "parent_id": "default", "options": {}, "domain_id": "default", "name": "patrole-project_c9449aea-7375-422f-b76a-ec410c1f47ef"}, {"is_domain": false, "description": "", "links": {"self": "http://172.30.12.85/identity/v3/projects/f1530c05c13c4f1dbfd6a716d0ea1cda"}, "tags": [], "enabled": true, "id": "f1530c05c13c4f1dbfd6a716d0ea1cda", "parent_id": "default", "options": {}, "domain_id": "default", "name": "project_a"}, {"is_domain": false, "description": "tempest-QosExtRbacTest-1855154360-desc", "links": {"self": "http://172.30.12.85/identity/v3/projects/f6f95180001448fda82e8f222c16a5e5"}, "tags": [], "enabled": true, "id": "f6f95180001448fda82e8f222c16a5e5", "parent_id": "default", "options": {}, "domain_id": "default", "name": "tempest-QosExtRbacTest-1855154360"}]} 2020-02-21 20:14:31,085 - keystoneauth.session - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-603463f9-0f85-4bd7-8a26-4d7391776791 2020-02-21 20:14:31,085 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.GET.projects in 0.12264728546142578s 2020-02-21 20:14:31,086 - shade.request_ids - DEBUG - GET call to identity for http://172.30.12.85/identity/v3/projects used request id req-603463f9-0f85-4bd7-8a26-4d7391776791 2020-02-21 20:14:31,095 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task identity.DELETE.projects 2020-02-21 20:14:31,097 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:31,227 - keystoneauth.session - DEBUG - RESP: [204] Connection: close Date: Fri, 21 Feb 2020 20:14:31 GMT Server: Apache/2.4.29 (Ubuntu) Vary: X-Auth-Token x-openstack-request-id: req-18e2aded-4511-422b-8040-69923bf0fa86 2020-02-21 20:14:31,228 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:31,228 - keystoneauth.session - DEBUG - DELETE call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d used request id req-18e2aded-4511-422b-8040-69923bf0fa86 2020-02-21 20:14:31,228 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task identity.DELETE.projects in 0.1326432228088379s 2020-02-21 20:14:31,228 - shade.request_ids - DEBUG - DELETE call to identity for http://172.30.12.85/identity/v3/projects/3bb960f3511b4610bdd88acf066f912d used request id req-18e2aded-4511-422b-8040-69923bf0fa86 2020-02-21 20:14:31,234 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.security-groups 2020-02-21 20:14:31,235 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET "http://172.30.12.85:9696/v2.0/security-groups.json?name=default&project_id=3bb960f3511b4610bdd88acf066f912d" -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:31,342 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 2434 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:31 GMT X-Openstack-Request-Id: req-d5a3841f-6f7f-45c2-8759-0665575bfb29 2020-02-21 20:14:31,343 - keystoneauth.session - DEBUG - RESP BODY: {"security_groups": [{"description": "Default security group", "tags": [], "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "created_at": "2020-02-21T20:07:01Z", "updated_at": "2020-02-21T20:07:01Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "0c34ecd6-97ff-495e-abca-bc0576726cb4", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "37931a39-a3c9-46ab-861d-6e2c64f9dfe0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "e318f994-5ae1-434b-a60f-c0d2e54317d7", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "f93dfb51-41bf-489e-92ba-cac9adf7f8c7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}], "revision_number": 1, "project_id": "3bb960f3511b4610bdd88acf066f912d", "id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "name": "default"}]} 2020-02-21 20:14:31,343 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json?name=default&project_id=3bb960f3511b4610bdd88acf066f912d used request id req-d5a3841f-6f7f-45c2-8759-0665575bfb29 2020-02-21 20:14:31,343 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.security-groups in 0.10869312286376953s 2020-02-21 20:14:31,344 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json?name=default&project_id=3bb960f3511b4610bdd88acf066f912d used request id req-d5a3841f-6f7f-45c2-8759-0665575bfb29 2020-02-21 20:14:31,349 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.GET.security-groups 2020-02-21 20:14:31,350 - keystoneauth.session - DEBUG - REQ: curl -g -i -X GET http://172.30.12.85:9696/v2.0/security-groups.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:32,274 - keystoneauth.session - DEBUG - RESP: [200] Connection: keep-alive Content-Length: 72487 Content-Type: application/json Date: Fri, 21 Feb 2020 20:14:32 GMT X-Openstack-Request-Id: req-a5090130-03c4-47ba-b452-94d5d317890a 2020-02-21 20:14:32,279 - keystoneauth.session - DEBUG - RESP BODY: {"security_groups": [{"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:06:27Z", "updated_at": "2020-02-21T19:06:27Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "530c6140-c5ba-4a6b-a998-44d7919017ae", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "ca68d7f4-f037-45ee-a4af-369ba82af620", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "05a76081-8b1b-45ea-9b5e-d7b644a7912f", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-3"}, {"description": "Default security group", "tags": [], "tenant_id": "dd7bface585b4e559a26e7b5c9f174d9", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "036e26b0-e887-465f-b1b2-e3bd1a07a2c6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "tenant_id": "dd7bface585b4e559a26e7b5c9f174d9", "port_range_min": null, "ethertype": "IPv4", "project_id": "dd7bface585b4e559a26e7b5c9f174d9"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "0d1ad619-c1bd-4744-a891-ee1bf94eb0b0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "tenant_id": "dd7bface585b4e559a26e7b5c9f174d9", "port_range_min": null, "ethertype": "IPv6", "project_id": "dd7bface585b4e559a26e7b5c9f174d9"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "9b5503fd-5599-4614-9bf6-29586a2b237c", "remote_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "tenant_id": "dd7bface585b4e559a26e7b5c9f174d9", "port_range_min": null, "ethertype": "IPv6", "project_id": "dd7bface585b4e559a26e7b5c9f174d9"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "a0270da4-d217-4bf3-a382-005f7178e22e", "remote_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "tenant_id": "dd7bface585b4e559a26e7b5c9f174d9", "port_range_min": null, "ethertype": "IPv4", "project_id": "dd7bface585b4e559a26e7b5c9f174d9"}], "revision_number": 1, "project_id": "dd7bface585b4e559a26e7b5c9f174d9", "id": "0e1be8ac-b5ae-47ae-9d75-a9585563b04d", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "7b4d5af7-bfea-4d0e-acde-ee652e548f04", "remote_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv4", "project_id": "86527d686fa84b39815b22d0c6247ae6"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "c089617e-e33a-4b6b-be39-74ab69bd2ac8", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv6", "project_id": "86527d686fa84b39815b22d0c6247ae6"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "d9193b23-4619-49db-a43d-1bb3f8821d0f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv4", "project_id": "86527d686fa84b39815b22d0c6247ae6"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "e03a0a7c-6d10-419b-9570-83fd9dd20ec7", "remote_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "1096787c-2ebc-4307-879f-89658fae2b02", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv6", "project_id": "86527d686fa84b39815b22d0c6247ae6"}], "revision_number": 1, "project_id": "86527d686fa84b39815b22d0c6247ae6", "id": "1096787c-2ebc-4307-879f-89658fae2b02", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:03Z", "updated_at": "2020-02-21T18:58:03Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "5b81ec76-ba0b-487f-a578-f9a39353bb9d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "8beaa92b-c2ce-412b-b713-16d24473b6a2", "remote_group_id": "163b6269-d469-423f-9626-77f900c5487c", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "a8c2f29b-5fe0-41cc-be59-6e51d71163e4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:03Z", "revision_number": 0, "id": "bf37f0a3-1d45-448d-ab35-9a1f7f4938b9", "remote_group_id": "163b6269-d469-423f-9626-77f900c5487c", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:03Z", "security_group_id": "163b6269-d469-423f-9626-77f900c5487c", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "163b6269-d469-423f-9626-77f900c5487c", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "cac386b78ca64bd4b01a3355596f1dea", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "212fca86-75ca-45df-9f1a-847f789e7269", "remote_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "tenant_id": "cac386b78ca64bd4b01a3355596f1dea", "port_range_min": null, "ethertype": "IPv6", "project_id": "cac386b78ca64bd4b01a3355596f1dea"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "2a53cf20-80e5-4c83-ae24-8828ba9bf91e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "tenant_id": "cac386b78ca64bd4b01a3355596f1dea", "port_range_min": null, "ethertype": "IPv4", "project_id": "cac386b78ca64bd4b01a3355596f1dea"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "9b9bb9da-d99c-4bb0-b724-b96f57d04083", "remote_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "tenant_id": "cac386b78ca64bd4b01a3355596f1dea", "port_range_min": null, "ethertype": "IPv4", "project_id": "cac386b78ca64bd4b01a3355596f1dea"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "ee7f3e38-72a3-4287-9d16-2a4182ff4e50", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "tenant_id": "cac386b78ca64bd4b01a3355596f1dea", "port_range_min": null, "ethertype": "IPv6", "project_id": "cac386b78ca64bd4b01a3355596f1dea"}], "revision_number": 1, "project_id": "cac386b78ca64bd4b01a3355596f1dea", "id": "35d8ee0b-a508-4829-b5dc-50a58296fd33", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "e479343d5fff47bb96822a0889fa3366", "created_at": "2020-02-21T01:06:51Z", "updated_at": "2020-02-21T01:06:51Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "278edddc-df57-4c13-a9b6-17a7823bc7eb", "remote_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv4", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "337cd6ae-f105-46ee-a55f-562f771fd598", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv4", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "3a5b395b-4754-48a8-b7ce-9bf1fbbe22e6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv6", "project_id": "e479343d5fff47bb96822a0889fa3366"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:06:51Z", "revision_number": 0, "id": "3ca2ac53-718a-496b-a445-9501a21103c0", "remote_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "remote_ip_prefix": null, "created_at": "2020-02-21T01:06:51Z", "security_group_id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "tenant_id": "e479343d5fff47bb96822a0889fa3366", "port_range_min": null, "ethertype": "IPv6", "project_id": "e479343d5fff47bb96822a0889fa3366"}], "revision_number": 1, "project_id": "e479343d5fff47bb96822a0889fa3366", "id": "3cf10052-43c1-45c3-bb2f-76033e7c1d21", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "1a0a0444-d342-4dec-a7fb-b3f04eaac1e7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "tenant_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "port_range_min": null, "ethertype": "IPv4", "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "4f9dceb1-a7ff-4795-a00d-e1e2f8abb8f5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "tenant_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "port_range_min": null, "ethertype": "IPv6", "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "82f7bb48-1277-4de7-a3e1-32cfda29d7d5", "remote_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "tenant_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "port_range_min": null, "ethertype": "IPv4", "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "90b25ed7-666c-4ee1-9d2e-f4def8f7b834", "remote_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "tenant_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "port_range_min": null, "ethertype": "IPv6", "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a"}], "revision_number": 1, "project_id": "cfa8bb452d5d4e9aa8c73bc7ebf0456a", "id": "4964c1ce-5f51-4e95-b8d2-96cc720a69d9", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "f0ae165616b14cf5990f6671a5206457", "created_at": "2020-02-21T20:13:22Z", "updated_at": "2020-02-21T20:13:22Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "4113a51e-bae6-44a4-b814-6c21092b43b4", "remote_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv4", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "73b8f1b3-c484-4138-a98b-fe5dc13394b1", "remote_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv6", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "918dbe1c-9fd0-49da-9344-78e96c54ff63", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv4", "project_id": "f0ae165616b14cf5990f6671a5206457"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:13:22Z", "revision_number": 0, "id": "cf41607c-d22e-4fc2-9734-5821392e8177", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:13:22Z", "security_group_id": "55dbb139-0435-4a03-8633-92a770c9cc16", "tenant_id": "f0ae165616b14cf5990f6671a5206457", "port_range_min": null, "ethertype": "IPv6", "project_id": "f0ae165616b14cf5990f6671a5206457"}], "revision_number": 1, "project_id": "f0ae165616b14cf5990f6671a5206457", "id": "55dbb139-0435-4a03-8633-92a770c9cc16", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "ec90059df02c44d9b2c092e475022b96", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "1d4d1f02-94ac-4676-b15f-82762e764a4d", "remote_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "tenant_id": "ec90059df02c44d9b2c092e475022b96", "port_range_min": null, "ethertype": "IPv4", "project_id": "ec90059df02c44d9b2c092e475022b96"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "65a1ec4c-5583-4066-b0ba-919af2afb3b7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "tenant_id": "ec90059df02c44d9b2c092e475022b96", "port_range_min": null, "ethertype": "IPv4", "project_id": "ec90059df02c44d9b2c092e475022b96"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "9323aef9-1389-4030-bf1d-93fc808aebe1", "remote_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "tenant_id": "ec90059df02c44d9b2c092e475022b96", "port_range_min": null, "ethertype": "IPv6", "project_id": "ec90059df02c44d9b2c092e475022b96"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "ed603c44-0d5e-4795-a8ed-a78ee7d265f1", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "tenant_id": "ec90059df02c44d9b2c092e475022b96", "port_range_min": null, "ethertype": "IPv6", "project_id": "ec90059df02c44d9b2c092e475022b96"}], "revision_number": 1, "project_id": "ec90059df02c44d9b2c092e475022b96", "id": "7bbdc273-8986-4235-aa3a-e19e7c50d74a", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:35Z", "updated_at": "2020-02-21T18:58:37Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "08805842-390f-491f-b283-3652c0c88953", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "0f4aefed-07a9-42d5-a32c-8c0dd87e626c", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "12351aad-3e18-4406-81c2-e51a236c1872", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "2cc29f0a-30a1-4845-bbfd-bdab64f2e0f8", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "518062eb-4534-4803-8eb9-f51a1b230a25", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "7444f955-d882-483e-8ec9-0eb2d1648102", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "8e726a72-83ee-421a-821c-626360c81547", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "a310ca50-359d-46bb-9652-62be02dcb3c9", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "be14edc5-e555-4871-9727-5d5f2b67235f", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "c8640b69-0145-4f4d-8859-bc921ebb3b9d", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "eab290ad-2342-412f-b575-dbe5e905e66b", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "ipv6-icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:36Z", "revision_number": 0, "id": "eacca0bd-487a-4008-9773-be5f73d6df61", "remote_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:36Z", "security_group_id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 11, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "7ccedcd0-a89b-4df1-a175-a0b7e58028de", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-536bbce3-8558-4e82-81a4-5a1ff1b04ffa"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T18:58:37Z", "updated_at": "2020-02-21T18:58:37Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "23ecc159-1200-4153-891b-0a1fc99fbf97", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T18:58:37Z", "revision_number": 0, "id": "6f549427-609c-42b6-8a87-e471e7c80557", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T18:58:37Z", "security_group_id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "7d80e28b-9993-43df-b1d2-5cc5113c089b", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-536bbce3-8558-4e82-81a4-5a1ff1b04ffa-0"}, {"description": "Default security group", "tags": [], "tenant_id": "", "created_at": "2020-02-21T01:00:03Z", "updated_at": "2020-02-21T01:00:03Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "5462d949-c5db-4b6d-b667-4eb3c8a47813", "remote_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "b8301d7e-97f3-45f3-b136-85a2dc4939e5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "b995bfc3-6118-4cc7-a6ad-73e577f7a347", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv4", "project_id": ""}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T01:00:03Z", "revision_number": 0, "id": "e49c656d-b97e-4814-a3df-be55a7808ace", "remote_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "remote_ip_prefix": null, "created_at": "2020-02-21T01:00:03Z", "security_group_id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "tenant_id": "", "port_range_min": null, "ethertype": "IPv6", "project_id": ""}], "revision_number": 1, "project_id": "", "id": "7dd86de2-7baf-4ccc-a900-eebe6eea6d49", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "bbce078e7d7448af9a4e541eea454192", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:29Z", "revision_number": 0, "id": "1f62552f-279e-4033-aefe-01cd7907d3a0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:29Z", "security_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "tenant_id": "bbce078e7d7448af9a4e541eea454192", "port_range_min": null, "ethertype": "IPv6", "project_id": "bbce078e7d7448af9a4e541eea454192"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:29Z", "revision_number": 0, "id": "30e96166-0344-469e-a922-f8ab2e58257f", "remote_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:29Z", "security_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "tenant_id": "bbce078e7d7448af9a4e541eea454192", "port_range_min": null, "ethertype": "IPv6", "project_id": "bbce078e7d7448af9a4e541eea454192"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "fc287bf4-e201-4e88-90fa-5a6791c45a43", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "tenant_id": "bbce078e7d7448af9a4e541eea454192", "port_range_min": null, "ethertype": "IPv4", "project_id": "bbce078e7d7448af9a4e541eea454192"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "fd6e9a9e-00f8-40f1-a630-252ddad80deb", "remote_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "828cd87e-ed70-495c-a025-90f372def67f", "tenant_id": "bbce078e7d7448af9a4e541eea454192", "port_range_min": null, "ethertype": "IPv4", "project_id": "bbce078e7d7448af9a4e541eea454192"}], "revision_number": 1, "project_id": "bbce078e7d7448af9a4e541eea454192", "id": "828cd87e-ed70-495c-a025-90f372def67f", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:03:48Z", "updated_at": "2020-02-21T19:03:48Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:03:48Z", "revision_number": 0, "id": "3597a40c-dec8-4277-8a49-1a7fb2ce299d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:03:48Z", "security_group_id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:03:48Z", "revision_number": 0, "id": "cbba8906-8a4e-47cd-93ec-ac55df41c14c", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:03:48Z", "security_group_id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "84f03a67-0fdd-4ecc-8d3c-58268dbae656", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-1"}, {"description": "Default security group", "tags": [], "tenant_id": "63285b0d00834e3d85e2f995d3172d99", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "194f0a6c-cb3e-4db0-9144-62a6fcce2636", "remote_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "tenant_id": "63285b0d00834e3d85e2f995d3172d99", "port_range_min": null, "ethertype": "IPv4", "project_id": "63285b0d00834e3d85e2f995d3172d99"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "5ae30133-95a3-4c08-9678-e26aaa277a21", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "tenant_id": "63285b0d00834e3d85e2f995d3172d99", "port_range_min": null, "ethertype": "IPv4", "project_id": "63285b0d00834e3d85e2f995d3172d99"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "ebc84058-96f4-4036-bfa0-b0082d966845", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "tenant_id": "63285b0d00834e3d85e2f995d3172d99", "port_range_min": null, "ethertype": "IPv6", "project_id": "63285b0d00834e3d85e2f995d3172d99"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "f1c3aa4e-ae64-4b48-945f-ba1bee8da167", "remote_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "tenant_id": "63285b0d00834e3d85e2f995d3172d99", "port_range_min": null, "ethertype": "IPv6", "project_id": "63285b0d00834e3d85e2f995d3172d99"}], "revision_number": 1, "project_id": "63285b0d00834e3d85e2f995d3172d99", "id": "89035e9d-2907-4628-b73e-fbefb0c20f5f", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "f6f95180001448fda82e8f222c16a5e5", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "0fc2bc75-e75c-4b14-8513-98efecea9709", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "tenant_id": "f6f95180001448fda82e8f222c16a5e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "f6f95180001448fda82e8f222c16a5e5"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "74ac81e3-0220-425f-8385-0a6385916aa8", "remote_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "tenant_id": "f6f95180001448fda82e8f222c16a5e5", "port_range_min": null, "ethertype": "IPv4", "project_id": "f6f95180001448fda82e8f222c16a5e5"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "d6e4e641-0de2-4fa3-9ff3-01ef40377f55", "remote_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "tenant_id": "f6f95180001448fda82e8f222c16a5e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "f6f95180001448fda82e8f222c16a5e5"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "ebcb5232-fc7a-44b2-8e4e-373bbe408971", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "tenant_id": "f6f95180001448fda82e8f222c16a5e5", "port_range_min": null, "ethertype": "IPv6", "project_id": "f6f95180001448fda82e8f222c16a5e5"}], "revision_number": 1, "project_id": "f6f95180001448fda82e8f222c16a5e5", "id": "8be85156-74f6-459f-a0a9-eeba751d6c47", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:02:50Z", "updated_at": "2020-02-21T19:06:27Z", "security_group_rules": [{"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "30b8c25b-6872-4b8e-ba44-fdcaf7735c1f", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:50Z", "revision_number": 0, "id": "37241d63-fea1-4f04-bc1e-e7cff257ebec", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:50Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "4b7c7ca0-2db4-4a79-a63d-b7b2b4db914f", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "67aaef4c-263a-4e30-91c4-611b61962b25", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "7f77d800-059a-468c-93c0-11df4177565e", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "8017f51c-21a8-4d84-8b1c-c626efde4a75", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:50Z", "revision_number": 0, "id": "a5114ae1-dc32-47bc-9821-fabd1386979f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:50Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "udp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "bba82a48-fa66-4555-be5a-9e798fc1a795", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 17070, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "d536e76d-318f-40ea-b38a-23cda77b71a5", "remote_group_id": null, "remote_ip_prefix": "::/0", "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 17070, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 65535, "updated_at": "2020-02-21T19:02:51Z", "revision_number": 0, "id": "e1b6a891-fff9-49ab-899d-a6703afc9eb0", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:51Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 1, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "ipv6-icmp", "description": "", "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:06:27Z", "revision_number": 0, "id": "f89b3cc8-dc2f-40bd-8f13-9566e7ca5142", "remote_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "remote_ip_prefix": null, "created_at": "2020-02-21T19:06:27Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 22, "updated_at": "2020-02-21T19:06:26Z", "revision_number": 0, "id": "fb0434fc-bd4c-421b-9d29-1a08d742239f", "remote_group_id": null, "remote_ip_prefix": "0.0.0.0/0", "created_at": "2020-02-21T19:06:26Z", "security_group_id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": 22, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 47, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "91f02892-8f14-49a8-b25a-5da2a3c39a35", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337"}, {"description": "Default security group", "tags": [], "tenant_id": "c009ae6fe00c4f9dab5b8e63be937e55", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "0c26ce51-541c-4ee5-9d8d-e9bd351161e1", "remote_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "tenant_id": "c009ae6fe00c4f9dab5b8e63be937e55", "port_range_min": null, "ethertype": "IPv6", "project_id": "c009ae6fe00c4f9dab5b8e63be937e55"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "304c7f3f-405f-4469-9fce-a4aa7dbe97cc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "tenant_id": "c009ae6fe00c4f9dab5b8e63be937e55", "port_range_min": null, "ethertype": "IPv4", "project_id": "c009ae6fe00c4f9dab5b8e63be937e55"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "6bfcf1bf-2164-42ab-a4e0-76d310fde313", "remote_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "tenant_id": "c009ae6fe00c4f9dab5b8e63be937e55", "port_range_min": null, "ethertype": "IPv4", "project_id": "c009ae6fe00c4f9dab5b8e63be937e55"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "82bb1745-6952-4fa4-b94a-a1bce57a4d21", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "tenant_id": "c009ae6fe00c4f9dab5b8e63be937e55", "port_range_min": null, "ethertype": "IPv6", "project_id": "c009ae6fe00c4f9dab5b8e63be937e55"}], "revision_number": 1, "project_id": "c009ae6fe00c4f9dab5b8e63be937e55", "id": "a1bf2fba-c13f-4136-9871-c803b77005c0", "name": "default"}, {"description": "", "tags": [], "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "created_at": "2020-02-21T20:14:29Z", "updated_at": "2020-02-21T20:14:31Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:29Z", "revision_number": 0, "id": "371b59a0-2cd7-4915-956b-6e0af657608d", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:29Z", "security_group_id": "a3c3c73c-d97d-47c4-a6ca-3c016e6d4518", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv6", "project_id": "86527d686fa84b39815b22d0c6247ae6"}, {"direction": "ingress", "protocol": "tcp", "description": "", "tags": [], "port_range_max": 99, "updated_at": "2020-02-21T20:14:31Z", "revision_number": 0, "id": "464e8f5a-d21d-4169-9444-b4cf76b86726", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:31Z", "security_group_id": "a3c3c73c-d97d-47c4-a6ca-3c016e6d4518", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": 99, "ethertype": "IPv4", "project_id": "86527d686fa84b39815b22d0c6247ae6"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:29Z", "revision_number": 0, "id": "ec5a55f1-016e-45ad-8ced-e2395e86f678", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:29Z", "security_group_id": "a3c3c73c-d97d-47c4-a6ca-3c016e6d4518", "tenant_id": "86527d686fa84b39815b22d0c6247ae6", "port_range_min": null, "ethertype": "IPv4", "project_id": "86527d686fa84b39815b22d0c6247ae6"}], "revision_number": 2, "project_id": "86527d686fa84b39815b22d0c6247ae6", "id": "a3c3c73c-d97d-47c4-a6ca-3c016e6d4518", "name": "tempest-SecGroupRbacTest-secgroup-514640651"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:02:52Z", "updated_at": "2020-02-21T19:02:52Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:52Z", "revision_number": 0, "id": "91598305-c82b-41a8-9670-fb7787688bd4", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:52Z", "security_group_id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:02:52Z", "revision_number": 0, "id": "ba8dec00-e32b-4027-966e-9187ddb4d7a5", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:02:52Z", "security_group_id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "a3d30bc2-3468-4e11-a23d-7fa27deb8ad0", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-0"}, {"description": "Default security group", "tags": [], "tenant_id": "e1143eef336d43e0bb037b224f8560e1", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "0088bb14-ed15-4143-87cf-927d754f324e", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "tenant_id": "e1143eef336d43e0bb037b224f8560e1", "port_range_min": null, "ethertype": "IPv6", "project_id": "e1143eef336d43e0bb037b224f8560e1"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "2b4e22c0-1229-462a-8786-ccacc665b4e1", "remote_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "tenant_id": "e1143eef336d43e0bb037b224f8560e1", "port_range_min": null, "ethertype": "IPv6", "project_id": "e1143eef336d43e0bb037b224f8560e1"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "5e95009c-b16e-4141-bd32-9db6be81eefa", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "tenant_id": "e1143eef336d43e0bb037b224f8560e1", "port_range_min": null, "ethertype": "IPv4", "project_id": "e1143eef336d43e0bb037b224f8560e1"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "788eda8b-58ce-4fc8-9cec-0b335d94c2ca", "remote_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "tenant_id": "e1143eef336d43e0bb037b224f8560e1", "port_range_min": null, "ethertype": "IPv4", "project_id": "e1143eef336d43e0bb037b224f8560e1"}], "revision_number": 1, "project_id": "e1143eef336d43e0bb037b224f8560e1", "id": "a70200c2-0929-40e0-9559-22d8c4700f3e", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "created_at": "2020-02-21T20:07:01Z", "updated_at": "2020-02-21T20:07:01Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "0c34ecd6-97ff-495e-abca-bc0576726cb4", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "37931a39-a3c9-46ab-861d-6e2c64f9dfe0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv6", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "e318f994-5ae1-434b-a60f-c0d2e54317d7", "remote_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:07:01Z", "revision_number": 0, "id": "f93dfb51-41bf-489e-92ba-cac9adf7f8c7", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:07:01Z", "security_group_id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "tenant_id": "3bb960f3511b4610bdd88acf066f912d", "port_range_min": null, "ethertype": "IPv4", "project_id": "3bb960f3511b4610bdd88acf066f912d"}], "revision_number": 1, "project_id": "3bb960f3511b4610bdd88acf066f912d", "id": "b15fd94b-4a42-426a-a383-0ceda6e7d970", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "a797d657ad87499fa042531f1d75fc69", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "06ed3078-7778-4055-9d89-4c1a70f86246", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "tenant_id": "a797d657ad87499fa042531f1d75fc69", "port_range_min": null, "ethertype": "IPv4", "project_id": "a797d657ad87499fa042531f1d75fc69"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "34490189-87c7-4da8-bcc0-3176ec0232ff", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "tenant_id": "a797d657ad87499fa042531f1d75fc69", "port_range_min": null, "ethertype": "IPv6", "project_id": "a797d657ad87499fa042531f1d75fc69"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "7cc10dad-7430-4e1e-8906-708bad94300b", "remote_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "tenant_id": "a797d657ad87499fa042531f1d75fc69", "port_range_min": null, "ethertype": "IPv4", "project_id": "a797d657ad87499fa042531f1d75fc69"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "a5bdb55f-4b01-4562-b997-7a03c909e067", "remote_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c138c3c7-1781-418a-92e0-b87d731baff3", "tenant_id": "a797d657ad87499fa042531f1d75fc69", "port_range_min": null, "ethertype": "IPv6", "project_id": "a797d657ad87499fa042531f1d75fc69"}], "revision_number": 1, "project_id": "a797d657ad87499fa042531f1d75fc69", "id": "c138c3c7-1781-418a-92e0-b87d731baff3", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "22ca4592c4fb458aa101fc57e9724531", "created_at": "2020-02-21T20:14:28Z", "updated_at": "2020-02-21T20:14:28Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "0b921b35-a87c-47cc-b452-3eaa92c8a3f7", "remote_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "tenant_id": "22ca4592c4fb458aa101fc57e9724531", "port_range_min": null, "ethertype": "IPv6", "project_id": "22ca4592c4fb458aa101fc57e9724531"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "b6530d7a-879d-4f80-b0f1-36e466256ea5", "remote_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "tenant_id": "22ca4592c4fb458aa101fc57e9724531", "port_range_min": null, "ethertype": "IPv4", "project_id": "22ca4592c4fb458aa101fc57e9724531"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "ee7fbc9b-ef70-4ff5-8dbb-501ca7affe4f", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "tenant_id": "22ca4592c4fb458aa101fc57e9724531", "port_range_min": null, "ethertype": "IPv6", "project_id": "22ca4592c4fb458aa101fc57e9724531"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T20:14:28Z", "revision_number": 0, "id": "f65b7e6f-2ae0-450a-84fd-7e0924ef57dd", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T20:14:28Z", "security_group_id": "c977af08-51cb-43de-a244-3f7996d05613", "tenant_id": "22ca4592c4fb458aa101fc57e9724531", "port_range_min": null, "ethertype": "IPv4", "project_id": "22ca4592c4fb458aa101fc57e9724531"}], "revision_number": 1, "project_id": "22ca4592c4fb458aa101fc57e9724531", "id": "c977af08-51cb-43de-a244-3f7996d05613", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "created_at": "2020-02-21T15:16:29Z", "updated_at": "2020-02-21T15:16:29Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "16e72fa5-b30c-4e2e-814f-38ad140ea40b", "remote_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv4", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "48694fd3-4178-424f-a0bb-e4c551baa8b0", "remote_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv6", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "5e1bc03f-b953-44d2-acd2-06aad6f8d8a6", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv6", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:16:29Z", "revision_number": 0, "id": "988c00ec-7873-43af-8f7f-a868d19a68cc", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:16:29Z", "security_group_id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "tenant_id": "7b343734bc9049139d7e4a1fa7dcaae8", "port_range_min": null, "ethertype": "IPv4", "project_id": "7b343734bc9049139d7e4a1fa7dcaae8"}], "revision_number": 1, "project_id": "7b343734bc9049139d7e4a1fa7dcaae8", "id": "d0c767be-b501-46ff-9fbf-a38ec071e7ea", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "457b822374de45b5a7624827c06b5ff5", "created_at": "2020-02-21T00:59:53Z", "updated_at": "2020-02-21T00:59:53Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "c3666cb2-6213-42bf-befd-8e725beaa14f", "remote_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv4", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "cb6ab524-e3a3-48b7-bbe7-9db3e370e7f0", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv6", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "fe5bee18-c280-4dd1-825d-a15016dfbdff", "remote_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv6", "project_id": "457b822374de45b5a7624827c06b5ff5"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:53Z", "revision_number": 0, "id": "ff285830-5bd8-4f2a-bec7-a80205aa6035", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:53Z", "security_group_id": "db7eea14-599f-4820-b502-3ec857d5ef79", "tenant_id": "457b822374de45b5a7624827c06b5ff5", "port_range_min": null, "ethertype": "IPv4", "project_id": "457b822374de45b5a7624827c06b5ff5"}], "revision_number": 1, "project_id": "457b822374de45b5a7624827c06b5ff5", "id": "db7eea14-599f-4820-b502-3ec857d5ef79", "name": "default"}, {"description": "Default security group", "tags": [], "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "created_at": "2020-02-21T00:59:32Z", "updated_at": "2020-02-21T00:59:32Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "bf5042c6-5090-4386-a4a7-170ec1f0bb58", "remote_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv4", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "c866ac42-932c-461f-8cd3-6a23d8e2c9ed", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv6", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "cc702a75-f042-4cc6-b0e2-569ab1994aaa", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv4", "project_id": "3a550fb8c83e4161886059d8b8d86710"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T00:59:32Z", "revision_number": 0, "id": "e5c621bd-36c5-4206-98e2-96da16a5fe9f", "remote_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "remote_ip_prefix": null, "created_at": "2020-02-21T00:59:32Z", "security_group_id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "tenant_id": "3a550fb8c83e4161886059d8b8d86710", "port_range_min": null, "ethertype": "IPv6", "project_id": "3a550fb8c83e4161886059d8b8d86710"}], "revision_number": 1, "project_id": "3a550fb8c83e4161886059d8b8d86710", "id": "e88bd692-a416-4a22-a7d7-6a9950c30e7b", "name": "default"}, {"description": "juju group", "tags": [], "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "created_at": "2020-02-21T19:05:02Z", "updated_at": "2020-02-21T19:05:02Z", "security_group_rules": [{"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:05:02Z", "revision_number": 0, "id": "83d8e28f-c6cd-49de-8848-9765461c1f30", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:05:02Z", "security_group_id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv6", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T19:05:02Z", "revision_number": 0, "id": "ed97726d-9352-4b3a-b5a5-0714eeb26d97", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T19:05:02Z", "security_group_id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "tenant_id": "89f0296fc0c0431e81c8370bb90781d7", "port_range_min": null, "ethertype": "IPv4", "project_id": "89f0296fc0c0431e81c8370bb90781d7"}], "revision_number": 1, "project_id": "89f0296fc0c0431e81c8370bb90781d7", "id": "f1b0eb89-c77c-4a5a-8614-d5fee834a691", "name": "juju-ece901af-42d0-4367-822e-9af664e1eacf-127657fc-5e54-4294-828c-ee712483e337-2"}, {"description": "Default security group", "tags": [], "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "created_at": "2020-02-21T15:46:58Z", "updated_at": "2020-02-21T15:46:58Z", "security_group_rules": [{"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "1431a05a-d8d1-4958-ae2a-afc04ac78962", "remote_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv6", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "ingress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "1ad96301-9aed-40d6-adec-fef1a45c7fed", "remote_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv4", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "77f93082-0ba3-468b-8c25-42a936001a53", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv6", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}, {"direction": "egress", "protocol": null, "description": null, "tags": [], "port_range_max": null, "updated_at": "2020-02-21T15:46:58Z", "revision_number": 0, "id": "7dfab90e-f596-49e6-836c-039aec65a38a", "remote_group_id": null, "remote_ip_prefix": null, "created_at": "2020-02-21T15:46:58Z", "security_group_id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "tenant_id": "1a10390d4a0a4cdbad40154220c8e211", "port_range_min": null, "ethertype": "IPv4", "project_id": "1a10390d4a0a4cdbad40154220c8e211"}], "revision_number": 1, "project_id": "1a10390d4a0a4cdbad40154220c8e211", "id": "fb0ecca8-2997-44d2-83ef-3a1ddd61bf34", "name": "default"}]} 2020-02-21 20:14:32,280 - keystoneauth.session - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json used request id req-a5090130-03c4-47ba-b452-94d5d317890a 2020-02-21 20:14:32,280 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.GET.security-groups in 0.9302923679351807s 2020-02-21 20:14:32,282 - shade.request_ids - DEBUG - GET call to network for http://172.30.12.85:9696/v2.0/security-groups.json used request id req-a5090130-03c4-47ba-b452-94d5d317890a 2020-02-21 20:14:32,292 - shade.task_manager - DEBUG - Manager envvars:RegionOne running task network.DELETE.security-groups 2020-02-21 20:14:32,292 - keystoneauth.session - DEBUG - REQ: curl -g -i -X DELETE http://172.30.12.85:9696/v2.0/security-groups/b15fd94b-4a42-426a-a383-0ceda6e7d970.json -H "User-Agent: os-client-config/1.33.0 openstacksdk/0.36.1 shade/1.32.0 keystoneauth1/3.17.1 python-requests/2.22.0 CPython/3.7.5" -H "X-Auth-Token: {SHA256}a681c79ce4ee690a6ce62e305b9b4e7b392e9afb4ae23fdf3d26f4cfe146e777" 2020-02-21 20:14:32,508 - keystoneauth.session - DEBUG - RESP: [204] Connection: keep-alive Content-Length: 0 Date: Fri, 21 Feb 2020 20:14:32 GMT X-Openstack-Request-Id: req-2803132e-afca-4bc4-83a6-948f480184cf 2020-02-21 20:14:32,508 - keystoneauth.session - DEBUG - RESP BODY: Omitted, Content-Type is set to None. Only application/json responses have their bodies logged. 2020-02-21 20:14:32,508 - keystoneauth.session - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/security-groups/b15fd94b-4a42-426a-a383-0ceda6e7d970.json used request id req-2803132e-afca-4bc4-83a6-948f480184cf 2020-02-21 20:14:32,508 - shade.task_manager - DEBUG - Manager envvars:RegionOne ran task network.DELETE.security-groups in 0.21642327308654785s 2020-02-21 20:14:32,509 - shade.request_ids - DEBUG - DELETE call to network for http://172.30.12.85:9696/v2.0/security-groups/b15fd94b-4a42-426a-a383-0ceda6e7d970.json used request id req-2803132e-afca-4bc4-83a6-948f480184cf 2020-02-21 20:14:33,049 - xtesting.core.testcase - DEBUG - Publishing /home/opnfv/functest/results/functest.log ('text/plain', None) 2020-02-21 20:14:33,285 - xtesting.core.testcase - DEBUG - Publishing /home/opnfv/functest/results/functest.debug.log ('text/plain', None)