2026-01-22 15:35:00.934103 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-22 15:35:00.934147 version_info = version.StrictVersion(__version__).version 2026-01-22 15:35:00.957979 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-22 15:35:00.958049 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-22 15:35:00.967806 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-22 15:35:01.475039 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-22 15:35:01.475829 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-22 15:35:02.705234 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-22 15:35:02.705263 version_info = version.StrictVersion(__version__).version 2026-01-22 15:35:02.724225 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-22 15:35:02.724302 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-22 15:35:02.730233 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-22 15:35:03.050700 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-22 15:35:03.051030 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-22 15:35:04.127247 /usr/local/lib/python3.12/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. 2026-01-22 15:35:04.127278 version_info = version.StrictVersion(__version__).version 2026-01-22 15:35:04.146464 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerMiddleware' 2026-01-22 15:35:04.146538 DEBUG django.request MiddlewareNotUsed: 'openstack_dashboard.contrib.developer.profiler.middleware.ProfilerClientMiddleware' 2026-01-22 15:35:04.153364 DEBUG django.request MiddlewareNotUsed: 'horizon.middleware.OperationLogMiddleware' 2026-01-22 15:35:04.558325 DEBUG horizon.base Load condition failed for panel: identity_providers 2026-01-22 15:35:04.558652 DEBUG horizon.base Load condition failed for panel: mappings 2026-01-22 15:35:04.845792 DEBUG openstack_auth.backend Beginning user authentication 2026-01-22 15:35:04.845981 DEBUG openstack_auth.plugin.password Attempting to authenticate for tempest-TestDashboardBasicOps-2141911784-project-member 2026-01-22 15:35:04.846559 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:04.932361 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:04.000000Z"}} 2026-01-22 15:35:04.932784 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:04.967094 DEBUG keystoneauth.session Request returned failure status: 401 2026-01-22 15:35:04.967327 INFO openstack_auth.plugin.base Attempted scope to domain Default failed, will attempt to scope to another domain. 2026-01-22 15:35:04.968999 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects? -H "Accept: application/json" -H "Forwarded: for=::1;by=python-keystoneclient" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}fce15eca26c7cab812a6db72e92d38d934b767adb4cfea96fa120b03ba70ae22" 2026-01-22 15:35:05.017479 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 521 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:04 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-b2d14803-e6a7-4d28-95e5-e3386f7d0b11 2026-01-22 15:35:05.017668 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-2141911784-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.245/identity/v3/projects/bd06cedd48b54c8899cea4fd7ce9ecac"}}], "links": {"next": null, "self": "https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects", "previous": null}} 2026-01-22 15:35:05.017678 2026-01-22 15:35:05.017771 DEBUG keystoneauth.session GET call to identity for https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects used request id req-b2d14803-e6a7-4d28-95e5-e3386f7d0b11 2026-01-22 15:35:05.018038 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:05.036272 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password", "token"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["2W7BXvzFQL-Mw28qbGhl0A", "G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784"}, "is_domain": false, "roles": [{"id": "3c16fff343a446d4bfc8cf02c657e9f1", "name": "member"}, {"id": "c708f310a2b8409a85757d4056d33a57", "name": "reader"}], "catalog": [{"endpoints": [{"id": "cc71c007a60740ceb0198756241fbd19", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2/bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "37ef80be586945828d6e093516e75a4a", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "a6bf882e985940cea58dbed70e980e6f", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.245:8080", "region": "RegionOne"}, {"id": "f3ed91ca7eb84e8bab0ca6bd6305d36e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245:8080/v1/AUTH_bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "49a7a972cd5c494a96187ad05e5d1e9c", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "b87efe2fae764ec880c40ea85c7074e5", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/placement", "region": "RegionOne"}], "id": "4eca87a6cc9a46f2b1af771cd390efd1", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "c72ae96245434d0f8a1893c87e4a87c9", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/identity", "region": "RegionOne"}], "id": "5713f2d3d59046c7bdfa0050ea43b438", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "3a9f59dec17d4d4fb1152d47ec5f5096", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/volume/v3", "region": "RegionOne"}], "id": "7336d6cac0d64d8180324396a8006e70", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "7c68002960bf4bf29db3c5f860a20409", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2.1", "region": "RegionOne"}], "id": "7c686f17be4d4276a95464ab28d8e169", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "d3954f5e29ef4cc1a879ee3fcc7c816e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/image", "region": "RegionOne"}], "id": "bd94ed67b08744d0bd813e745376cf4d", "type": "image", "name": "glance"}, {"endpoints": [{"id": "4c1c30019f1646c5bdb2e43a89c50625", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/networking", "region": "RegionOne"}], "id": "d970d824e1f14e309fe158e2fa2f9ef3", "type": "network", "name": "neutron"}]}} 2026-01-22 15:35:05.037788 DEBUG openstack_auth.backend Authentication completed. 2026-01-22 15:35:05.037923 INFO openstack_auth.forms Login successful for user "tempest-TestDashboardBasicOps-2141911784-project-member" using domain "Default", remote address ::1. 2026-01-22 15:35:05.058911 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:05.073050 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 273 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT Location: https://38.102.83.245/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-82226f82-8ec7-4722-86af-8bb3571da1a7 2026-01-22 15:35:05.073239 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-22 15:35:05.073337 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity used request id req-82226f82-8ec7-4722-86af-8bb3571da1a7 2026-01-22 15:35:05.073702 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:05.103374 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password", "token"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["X4vr9EIGQGCBuFx5kWepAg", "G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784"}, "is_domain": false, "roles": [{"id": "3c16fff343a446d4bfc8cf02c657e9f1", "name": "member"}, {"id": "c708f310a2b8409a85757d4056d33a57", "name": "reader"}], "catalog": [{"endpoints": [{"id": "cc71c007a60740ceb0198756241fbd19", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2/bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "37ef80be586945828d6e093516e75a4a", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "a6bf882e985940cea58dbed70e980e6f", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.245:8080", "region": "RegionOne"}, {"id": "f3ed91ca7eb84e8bab0ca6bd6305d36e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245:8080/v1/AUTH_bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "49a7a972cd5c494a96187ad05e5d1e9c", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "b87efe2fae764ec880c40ea85c7074e5", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/placement", "region": "RegionOne"}], "id": "4eca87a6cc9a46f2b1af771cd390efd1", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "c72ae96245434d0f8a1893c87e4a87c9", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/identity", "region": "RegionOne"}], "id": "5713f2d3d59046c7bdfa0050ea43b438", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "3a9f59dec17d4d4fb1152d47ec5f5096", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/volume/v3", "region": "RegionOne"}], "id": "7336d6cac0d64d8180324396a8006e70", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "7c68002960bf4bf29db3c5f860a20409", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2.1", "region": "RegionOne"}], "id": "7c686f17be4d4276a95464ab28d8e169", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "d3954f5e29ef4cc1a879ee3fcc7c816e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/image", "region": "RegionOne"}], "id": "bd94ed67b08744d0bd813e745376cf4d", "type": "image", "name": "glance"}, {"endpoints": [{"id": "4c1c30019f1646c5bdb2e43a89c50625", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/networking", "region": "RegionOne"}], "id": "d970d824e1f14e309fe158e2fa2f9ef3", "type": "network", "name": "neutron"}]}} 2026-01-22 15:35:05.103731 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}9e90fbee82647f0e362b6e8b3b880a0d533aa47ee1c41bcb95f95b2ff7b35c45" 2026-01-22 15:35:05.117469 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 392 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-5b43d9fa-86e7-4498-a23e-a3dd1519e750 x-openstack-request-id: req-5b43d9fa-86e7-4498-a23e-a3dd1519e750 2026-01-22 15:35:05.117632 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.100", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.245/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-01-22 15:35:05.117743 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1 used request id req-5b43d9fa-86e7-4498-a23e-a3dd1519e750 2026-01-22 15:35:05.119354 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:05.132034 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 273 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT Location: https://38.102.83.245/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-b9c806f8-c4d3-4408-8d87-6756d01b8003 2026-01-22 15:35:05.132258 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-22 15:35:05.132389 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity used request id req-b9c806f8-c4d3-4408-8d87-6756d01b8003 2026-01-22 15:35:05.132759 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:05.159824 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password", "token"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["qKW3TqyhRRG7ARe6ggGiWg", "G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:05.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784"}, "is_domain": false, "roles": [{"id": "3c16fff343a446d4bfc8cf02c657e9f1", "name": "member"}, {"id": "c708f310a2b8409a85757d4056d33a57", "name": "reader"}], "catalog": [{"endpoints": [{"id": "cc71c007a60740ceb0198756241fbd19", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2/bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "37ef80be586945828d6e093516e75a4a", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "a6bf882e985940cea58dbed70e980e6f", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.245:8080", "region": "RegionOne"}, {"id": "f3ed91ca7eb84e8bab0ca6bd6305d36e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245:8080/v1/AUTH_bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "49a7a972cd5c494a96187ad05e5d1e9c", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "b87efe2fae764ec880c40ea85c7074e5", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/placement", "region": "RegionOne"}], "id": "4eca87a6cc9a46f2b1af771cd390efd1", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "c72ae96245434d0f8a1893c87e4a87c9", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/identity", "region": "RegionOne"}], "id": "5713f2d3d59046c7bdfa0050ea43b438", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "3a9f59dec17d4d4fb1152d47ec5f5096", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/volume/v3", "region": "RegionOne"}], "id": "7336d6cac0d64d8180324396a8006e70", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "7c68002960bf4bf29db3c5f860a20409", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2.1", "region": "RegionOne"}], "id": "7c686f17be4d4276a95464ab28d8e169", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "d3954f5e29ef4cc1a879ee3fcc7c816e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/image", "region": "RegionOne"}], "id": "bd94ed67b08744d0bd813e745376cf4d", "type": "image", "name": "glance"}, {"endpoints": [{"id": "4c1c30019f1646c5bdb2e43a89c50625", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/networking", "region": "RegionOne"}], "id": "d970d824e1f14e309fe158e2fa2f9ef3", "type": "network", "name": "neutron"}]}} 2026-01-22 15:35:05.160249 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1/os-simple-tenant-usage/bd06cedd48b54c8899cea4fd7ce9ecac?start=2026-01-21T00:00:00&end=2026-01-22T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}962718a00ffe0738eb3030d9717fe85be8ec774018f989553ec9df2d1577150a" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-01-22 15:35:05.306367 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-14d2ff01-71a3-40a7-84d2-7798681774e2 x-openstack-request-id: req-14d2ff01-71a3-40a7-84d2-7798681774e2 2026-01-22 15:35:05.306464 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-01-22 15:35:05.306531 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1/os-simple-tenant-usage/bd06cedd48b54c8899cea4fd7ce9ecac?start=2026-01-21T00:00:00&end=2026-01-22T23:59:59 used request id req-14d2ff01-71a3-40a7-84d2-7798681774e2 2026-01-22 15:35:05.316139 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}75c2268587d00342fd4eafe90880ae2297afba5e4ac94f3d98d29a08f2904781" 2026-01-22 15:35:05.395253 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 14961 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-7970196d-061d-45e3-a030-c9d47de7853a 2026-01-22 15:35:05.395898 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "2012-07-23T10:00:00-00:00", "links": []}, {"name": "project_id field enabled", "alias": "project-id", "description": "Extension that indicates that project_id field is enabled.", "updated": "2016-09-09T09:09:09-09:09", "links": []}, {"name": "Provid 2026-01-22 15:35:05.395987 DEBUG keystoneauth.session GET call to network for https://38.102.83.245/networking/v2.0/extensions used request id req-7970196d-061d-45e3-a030-c9d47de7853a 2026-01-22 15:35:05.448424 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}9e90fbee82647f0e362b6e8b3b880a0d533aa47ee1c41bcb95f95b2ff7b35c45" 2026-01-22 15:35:05.450355 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-01-22 15:35:05.463270 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/5cd8364f500557c769bea062f99ff803ce4ab6ae95d947572910d59f85edc24e 2026-01-22 15:35:05.477763 DEBUG cinderclient.client 2026-01-22 15:35:05.477786 REQ: curl -i https://38.102.83.245/volume/v3/limits?tenant_id=bd06cedd48b54c8899cea4fd7ce9ecac -X GET-H 'X-Auth-Token: {SHA1}8a501f7c63fb373cbd42490ea9e2cef54d616551'-H 'X-Auth-Project-Id: bd06cedd48b54c8899cea4fd7ce9ecac'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-01-22 15:35:05.478197 2026-01-22 15:35:05.531932 DEBUG cinderclient.client RESP: [200] {'Date': 'Thu, 22 Jan 2026 15:35:05 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-aa8c85f8-a5b3-45ae-abc1-cc5cb03d4dab', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-aa8c85f8-a5b3-45ae-abc1-cc5cb03d4dab', 'Connection': 'close'} 2026-01-22 15:35:05.532264 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-01-22 15:35:05.532295 2026-01-22 15:35:05.552156 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:05 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-2fb0279c-dfda-4549-bcab-ebc30221394b x-openstack-request-id: req-2fb0279c-dfda-4549-bcab-ebc30221394b 2026-01-22 15:35:05.557494 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-01-22 15:35:05.562744 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1/limits?reserved=1 used request id req-2fb0279c-dfda-4549-bcab-ebc30221394b 2026-01-22 15:35:05.912168 DEBUG:stevedore._cache:writing to /opt/stack/.cache/python-entrypoints/5cd8364f500557c769bea062f99ff803ce4ab6ae95d947572910d59f85edc24e 2026-01-22 15:35:05.917324 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.245/networking/v2.0/quotas/bd06cedd48b54c8899cea4fd7ce9ecac/details -X GET -H "X-Auth-Token: {SHA256}75c2268587d00342fd4eafe90880ae2297afba5e4ac94f3d98d29a08f2904781" -H "User-Agent: python-neutronclient"' 2026-01-22 15:35:05.982155 DEBUG neutronclient.client RESP: 200 {'Date': 'Thu, 22 Jan 2026 15:35:05 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-2ded2d38-f1b9-4c64-8e3d-c4bc2b8e63e6', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-01-22 15:35:05.982240 DEBUG neutronclient.client GET call to neutron for https://38.102.83.245/networking/v2.0/quotas/bd06cedd48b54c8899cea4fd7ce9ecac/details used request id req-2ded2d38-f1b9-4c64-8e3d-c4bc2b8e63e6 2026-01-22 15:35:06.985544 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}fce15eca26c7cab812a6db72e92d38d934b767adb4cfea96fa120b03ba70ae22" 2026-01-22 15:35:07.000428 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 521 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:06 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-c6b5ddf1-956d-4236-b0d4-381dbc695622 2026-01-22 15:35:07.000554 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-2141911784-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.245/identity/v3/projects/bd06cedd48b54c8899cea4fd7ce9ecac"}}], "links": {"next": null, "self": "https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects", "previous": null}} 2026-01-22 15:35:07.000560 2026-01-22 15:35:07.000606 DEBUG keystoneauth.session GET call to identity for https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects used request id req-c6b5ddf1-956d-4236-b0d4-381dbc695622 2026-01-22 15:35:07.015824 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml. 2026-01-22 15:35:07.256931 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-01-22 15:35:07.257395 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-01-22 15:35:07.276393 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-22 15:35:07.381175 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-22 15:35:07.383178 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-01-22 15:35:07.383834 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml. 2026-01-22 15:35:07.591345 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-22 15:35:07.591372 warnings.warn( 2026-01-22 15:35:07.597237 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-22 15:35:07.717752 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-22 15:35:07.718029 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-22 15:35:07.718981 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-22 15:35:07.721029 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-01-22 15:35:07.721708 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml. 2026-01-22 15:35:07.944910 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-22 15:35:07.944938 warnings.warn( 2026-01-22 15:35:07.951529 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-22 15:35:08.041947 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-22 15:35:08.043705 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-01-22 15:35:08.044337 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml. 2026-01-22 15:35:08.096530 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-22 15:35:08.121673 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-22 15:35:08.122306 DEBUG openstack_auth.policy adding enforcer for service: image 2026-01-22 15:35:08.122920 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml. 2026-01-22 15:35:08.454036 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-22 15:35:08.583635 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-22 15:35:08.586449 DEBUG openstack_auth.policy adding enforcer for service: network 2026-01-22 15:35:08.586774 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.586867 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:08.586902 warnings.warn(msg) 2026-01-22 15:35:08.587628 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.587702 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:08.587706 warnings.warn(msg) 2026-01-22 15:35:08.588186 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.588246 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:08.588251 warnings.warn(msg) 2026-01-22 15:35:08.588845 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.589302 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.589740 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.590168 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.590638 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.601446 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.601988 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.610829 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.611646 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.611690 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-01-22 15:35:08.611941 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.611976 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:08.612281 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.612317 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-01-22 15:35:08.612561 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.612598 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:08.612881 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.613291 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.613636 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.613955 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.614252 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.614551 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.614833 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.614867 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-01-22 15:35:08.615103 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.615135 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:08.615397 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.615686 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.615970 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.616003 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-01-22 15:35:08.616231 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.616266 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:08.616613 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.616900 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.617180 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.617847 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.618188 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.618458 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.618770 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.619128 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.619425 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.619692 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.619980 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.620265 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.620566 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.620902 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.621196 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.621820 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.622414 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.622999 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.623702 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.624396 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.625101 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.625194 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:08.625197 warnings.warn(msg) 2026-01-22 15:35:08.625648 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.245/identity/v3. 2026-01-22 15:35:08.628047 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:08.636168 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 258 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-10e3833f-bb81-4086-bb3b-0437206cf7f3 2026-01-22 15:35:08.636257 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-01-22 15:35:08.636299 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity/v3 used request id req-10e3833f-bb81-4086-bb3b-0437206cf7f3 2026-01-22 15:35:08.636817 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.636878 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:08.636881 warnings.warn(msg) 2026-01-22 15:35:08.637478 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.638105 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.638716 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.639374 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:08.698504 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:08.710775 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 273 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT Location: https://38.102.83.245/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-298ad541-a0c6-4c91-8c5e-b678cb8e1c51 2026-01-22 15:35:08.710952 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-22 15:35:08.711048 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity used request id req-298ad541-a0c6-4c91-8c5e-b678cb8e1c51 2026-01-22 15:35:08.711434 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:08.732967 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password", "token"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["ubIuM9I6QNOb6uaoHTK-Iw", "G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784"}, "is_domain": false, "roles": [{"id": "3c16fff343a446d4bfc8cf02c657e9f1", "name": "member"}, {"id": "c708f310a2b8409a85757d4056d33a57", "name": "reader"}], "catalog": [{"endpoints": [{"id": "cc71c007a60740ceb0198756241fbd19", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2/bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "37ef80be586945828d6e093516e75a4a", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "a6bf882e985940cea58dbed70e980e6f", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.245:8080", "region": "RegionOne"}, {"id": "f3ed91ca7eb84e8bab0ca6bd6305d36e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245:8080/v1/AUTH_bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "49a7a972cd5c494a96187ad05e5d1e9c", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "b87efe2fae764ec880c40ea85c7074e5", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/placement", "region": "RegionOne"}], "id": "4eca87a6cc9a46f2b1af771cd390efd1", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "c72ae96245434d0f8a1893c87e4a87c9", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/identity", "region": "RegionOne"}], "id": "5713f2d3d59046c7bdfa0050ea43b438", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "3a9f59dec17d4d4fb1152d47ec5f5096", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/volume/v3", "region": "RegionOne"}], "id": "7336d6cac0d64d8180324396a8006e70", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "7c68002960bf4bf29db3c5f860a20409", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2.1", "region": "RegionOne"}], "id": "7c686f17be4d4276a95464ab28d8e169", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "d3954f5e29ef4cc1a879ee3fcc7c816e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/image", "region": "RegionOne"}], "id": "bd94ed67b08744d0bd813e745376cf4d", "type": "image", "name": "glance"}, {"endpoints": [{"id": "4c1c30019f1646c5bdb2e43a89c50625", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/networking", "region": "RegionOne"}], "id": "d970d824e1f14e309fe158e2fa2f9ef3", "type": "network", "name": "neutron"}]}} 2026-01-22 15:35:08.733330 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}67188f7add57a12267c43903cd8f028a716c100edc317ad0982be56c7c7f4b6c" 2026-01-22 15:35:08.745142 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 392 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-4be10198-1f77-4f28-9bca-cf84e9ab121e x-openstack-request-id: req-4be10198-1f77-4f28-9bca-cf84e9ab121e 2026-01-22 15:35:08.745314 DEBUG novaclient.v2.client RESP BODY: {"version": {"id": "v2.1", "status": "CURRENT", "version": "2.100", "min_version": "2.1", "updated": "2013-07-23T11:33:21Z", "links": [{"rel": "self", "href": "https://38.102.83.245/compute/v2.1/"}, {"rel": "describedby", "type": "text/html", "href": "http://docs.openstack.org/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.compute+json;version=2.1"}]}} 2026-01-22 15:35:08.745411 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1 used request id req-4be10198-1f77-4f28-9bca-cf84e9ab121e 2026-01-22 15:35:08.746765 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity -H "Accept: application/json" -H "User-Agent: python-novaclient keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:08.757648 DEBUG keystoneauth.session RESP: [300] Connection: close Content-Length: 273 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT Location: https://38.102.83.245/identity/v3/ Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-87ae9842-54e3-4d2d-94a4-f63f7a46891f 2026-01-22 15:35:08.757794 DEBUG keystoneauth.session RESP BODY: {"versions": {"values": [{"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}]}} 2026-01-22 15:35:08.757885 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity used request id req-87ae9842-54e3-4d2d-94a4-f63f7a46891f 2026-01-22 15:35:08.758239 DEBUG keystoneauth.identity.v3.base Making authentication request to https://38.102.83.245/identity/v3/auth/tokens 2026-01-22 15:35:08.776046 DEBUG keystoneauth.identity.v3.base {"token": {"methods": ["password", "token"], "user": {"domain": {"id": "default", "name": "Default"}, "id": "caf4740a70e34d55b3bb839cdfc1d5f9", "name": "tempest-TestDashboardBasicOps-2141911784-project-member", "password_expires_at": null}, "audit_ids": ["c4OZTaKCRhyIb3KGvV2f7A", "G_C2NevJSa-gHQhKofzhPg"], "expires_at": "2026-01-22T16:35:04.000000Z", "issued_at": "2026-01-22T15:35:08.000000Z", "project": {"domain": {"id": "default", "name": "Default"}, "id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784"}, "is_domain": false, "roles": [{"id": "3c16fff343a446d4bfc8cf02c657e9f1", "name": "member"}, {"id": "c708f310a2b8409a85757d4056d33a57", "name": "reader"}], "catalog": [{"endpoints": [{"id": "cc71c007a60740ceb0198756241fbd19", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2/bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "37ef80be586945828d6e093516e75a4a", "type": "compute_legacy", "name": "nova_legacy"}, {"endpoints": [{"id": "a6bf882e985940cea58dbed70e980e6f", "interface": "admin", "region_id": "RegionOne", "url": "https://38.102.83.245:8080", "region": "RegionOne"}, {"id": "f3ed91ca7eb84e8bab0ca6bd6305d36e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245:8080/v1/AUTH_bd06cedd48b54c8899cea4fd7ce9ecac", "region": "RegionOne"}], "id": "49a7a972cd5c494a96187ad05e5d1e9c", "type": "object-store", "name": "swift"}, {"endpoints": [{"id": "b87efe2fae764ec880c40ea85c7074e5", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/placement", "region": "RegionOne"}], "id": "4eca87a6cc9a46f2b1af771cd390efd1", "type": "placement", "name": "placement"}, {"endpoints": [{"id": "c72ae96245434d0f8a1893c87e4a87c9", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/identity", "region": "RegionOne"}], "id": "5713f2d3d59046c7bdfa0050ea43b438", "type": "identity", "name": "keystone"}, {"endpoints": [{"id": "3a9f59dec17d4d4fb1152d47ec5f5096", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/volume/v3", "region": "RegionOne"}], "id": "7336d6cac0d64d8180324396a8006e70", "type": "block-storage", "name": "cinder"}, {"endpoints": [{"id": "7c68002960bf4bf29db3c5f860a20409", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/compute/v2.1", "region": "RegionOne"}], "id": "7c686f17be4d4276a95464ab28d8e169", "type": "compute", "name": "nova"}, {"endpoints": [{"id": "d3954f5e29ef4cc1a879ee3fcc7c816e", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/image", "region": "RegionOne"}], "id": "bd94ed67b08744d0bd813e745376cf4d", "type": "image", "name": "glance"}, {"endpoints": [{"id": "4c1c30019f1646c5bdb2e43a89c50625", "interface": "public", "region_id": "RegionOne", "url": "https://38.102.83.245/networking", "region": "RegionOne"}], "id": "d970d824e1f14e309fe158e2fa2f9ef3", "type": "network", "name": "neutron"}]}} 2026-01-22 15:35:08.776341 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1/os-simple-tenant-usage/bd06cedd48b54c8899cea4fd7ce9ecac?start=2026-01-21T00:00:00&end=2026-01-22T23:59:59 -H "Accept: application/json" -H "OpenStack-API-Version: compute 2.40" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}885f40bf883faa85e00a0ec4ff4ce79fb242c6225ecc22d4f785c1ecaf575c74" -H "X-OpenStack-Nova-API-Version: 2.40" 2026-01-22 15:35:08.847903 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 20 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT OpenStack-API-Version: compute 2.40 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.40 x-compute-request-id: req-e6e4e38d-dcf2-4955-be6f-27cdcf6e799b x-openstack-request-id: req-e6e4e38d-dcf2-4955-be6f-27cdcf6e799b 2026-01-22 15:35:08.848029 DEBUG novaclient.v2.client RESP BODY: {"tenant_usage": {}} 2026-01-22 15:35:08.848132 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1/os-simple-tenant-usage/bd06cedd48b54c8899cea4fd7ce9ecac?start=2026-01-21T00:00:00&end=2026-01-22T23:59:59 used request id req-e6e4e38d-dcf2-4955-be6f-27cdcf6e799b 2026-01-22 15:35:08.861180 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/networking/v2.0/extensions -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "X-Auth-Token: {SHA256}75c2268587d00342fd4eafe90880ae2297afba5e4ac94f3d98d29a08f2904781" 2026-01-22 15:35:08.875725 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 14961 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 x-openstack-request-id: req-f9fc5625-ffaf-4ea9-ae52-11f6ec03f0fa 2026-01-22 15:35:08.877178 DEBUG keystoneauth.session RESP BODY: {"extensions": [{"name": "Address group", "alias": "address-group", "description": "Support address group", "updated": "2020-07-15T10:00:00-00:00", "links": []}, {"name": "Address scope", "alias": "address-scope", "description": "Address scopes extension.", "updated": "2015-07-26T10:00:00-00:00", "links": []}, {"name": "agent", "alias": "agent", "description": "The agent management extension.", "updated": "2013-02-03T10:00:00-00:00", "links": []}, {"name": "Allowed Address Pairs", "alias": "allowed-address-pairs", "description": "Provides allowed address pairs", "updated": "2013-07-23T10:00:00-00:00", "links": []}, {"name": "Auto Allocated Topology Services", "alias": "auto-allocated-topology", "description": "Auto Allocated Topology Services.", "updated": "2016-01-01T00:00:00-00:00", "links": []}, {"name": "Availability Zone", "alias": "availability_zone", "description": "The availability zone extension.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Default Subnetpools", "alias": "default-subnetpools", "description": "Provides ability to mark and use a subnetpool as the default.", "updated": "2016-02-18T18:00:00-00:00", "links": []}, {"name": "DHCP Agent Scheduler", "alias": "dhcp_agent_scheduler", "description": "Schedule networks among dhcp agents", "updated": "2013-02-07T10:00:00-00:00", "links": []}, {"name": "DNS Integration", "alias": "dns-integration", "description": "Provides integration with DNS.", "updated": "2015-08-15T18:00:00-00:00", "links": []}, {"name": "dns_domain for ports", "alias": "dns-domain-ports", "description": "Allows the DNS domain to be specified for a network port.", "updated": "2017-04-24T10:00:00-00:00", "links": []}, {"name": "DNS domain names with keywords allowed", "alias": "dns-integration-domain-keywords", "description": "Allows to use keywords like , , and as DNS domain name", "updated": "2020-06-15T18:00:00-00:00", "links": []}, {"name": "Empty String Filtering Extension", "alias": "empty-string-filtering", "description": "Allow filtering by attributes with empty string value", "updated": "2018-05-01T10:00:00-00:00", "links": []}, {"name": "Neutron external network", "alias": "external-net", "description": "Adds external network attribute to network resource.", "updated": "2013-01-14T10:00:00-00:00", "links": []}, {"name": "Neutron Extra DHCP options", "alias": "extra_dhcp_opt", "description": "Extra options configuration for DHCP. For example PXE boot options to DHCP clients can be specified (e.g. tftp-server, server-ip-address, bootfile-name)", "updated": "2013-03-17T12:00:00-00:00", "links": []}, {"name": "Neutron Extra Route", "alias": "extraroute", "description": "Extra routes configuration for L3 router", "updated": "2013-02-01T10:00:00-00:00", "links": []}, {"name": "Atomically add/remove extra routes", "alias": "extraroute-atomic", "description": "Edit extra routes of a router on server side by atomically adding/removing extra routes", "updated": "2019-07-10T00:00:00+00:00", "links": []}, {"name": "Filter parameters validation", "alias": "filter-validation", "description": "Provides validation on filter parameters.", "updated": "2018-07-04T10:00:00-00:00", "links": []}, {"name": "Floating IP port forwarding detail", "alias": "floating-ip-port-forwarding-detail", "description": "Allow list floating ip return more port forwarding data, include'id' and 'internal_port_id'", "updated": "2022-05-06T10:00:00-00:00", "links": []}, {"name": "Floating IP Port Details Extension", "alias": "fip-port-details", "description": "Add port_details attribute to Floating IP resource", "updated": "2018-04-09T10:00:00-00:00", "links": []}, {"name": "Neutron Service Flavors", "alias": "flavors", "description": "Flavor specification for Neutron advanced services.", "updated": "2015-09-17T10:00:00-00:00", "links": []}, {"name": "Floating IP Pools Extension", "alias": "floatingip-pools", "description": "Provides a floating IP pools API.", "updated": "2018-03-21T10:00:00-00:00", "links": []}, {"name": "Neutron L3 Router", "alias": "router", "description": "Router abstraction for basic L3 forwarding between L2 Neutron networks and access to external networks via a NAT gateway.", "updated": "2012-07-20T10:00:00-00:00", "links": []}, {"name": "Enable Default Route BFD", "alias": "enable-default-route-bfd", "description": "Enables configurable BFD behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Enable Default Route ECMP", "alias": "enable-default-route-ecmp", "description": "Enables configurable ECMP behavior for default routes", "updated": "2023-02-27T00:00:00-00:00", "links": []}, {"name": "Neutron L3 Configurable external gateway mode", "alias": "ext-gw-mode", "description": "Extension of the router abstraction for specifying whether SNAT should occur on the external gateway", "updated": "2013-03-28T10:00:00-00:00", "links": []}, {"name": "HA Router extension", "alias": "l3-ha", "description": "Adds HA capability to routers.", "updated": "2014-04-26T00:00:00-00:00", "links": []}, {"name": "Neutron L3 External Gateway Multihoming", "alias": "external-gateway-multihoming", "description": "Allow multiple external gateway ports per router", "updated": "2023-01-18T00:00:00-00:00", "links": []}, {"name": "Router Flavor Extension", "alias": "l3-flavors", "description": "Flavor support for routers.", "updated": "2016-05-17T00:00:00-00:00", "links": []}, {"name": "Multi Provider Network", "alias": "multi-provider", "description": "Expose mapping of virtual networks to multiple physical networks", "updated": "2013-06-27T10:00:00-00:00", "links": []}, {"name": "Network MTU", "alias": "net-mtu", "description": "Provides MTU attribute for a network resource.", "updated": "2015-03-25T10:00:00-00:00", "links": []}, {"name": "Network MTU (writable)", "alias": "net-mtu-writable", "description": "Provides a writable MTU attribute for a network resource.", "updated": "2017-07-12T00:00:00-00:00", "links": []}, {"name": "Network Availability Zone", "alias": "network_availability_zone", "description": "Availability zone support for network.", "updated": "2015-01-01T10:00:00-00:00", "links": []}, {"name": "Network IP Availability", "alias": "network-ip-availability", "description": "Provides IP availability data for each network and subnet.", "updated": "2015-09-24T00:00:00-00:00", "links": []}, {"name": "Pagination support", "alias": "pagination", "description": "Extension that indicates that pagination is enabled.", "updated": "2016-06-12T00:00:00-00:00", "links": []}, {"name": "Port device profile", "alias": "port-device-profile", "description": "Expose the port device profile (Cyborg)", "updated": "2020-12-17T10:00:00-00:00", "links": []}, {"name": "Neutron Port MAC address regenerate", "alias": "port-mac-address-regenerate", "description": "Network port MAC address regenerate", "updated": "2018-05-03T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy", "alias": "port-numa-affinity-policy", "description": "Expose the port NUMA affinity policy", "updated": "2020-07-08T10:00:00-00:00", "links": []}, {"name": "Port NUMA affinity policy \\"socket\\"", "alias": "port-numa-affinity-policy-socket", "description": "Adds \\"socket\\" to the supported port NUMA affinity policies", "updated": "2024-02-09T10:00:00-00:00", "links": []}, {"name": "Port Binding", "alias": "binding", "description": "Expose port bindings of a virtual port to external application", "updated": "2014-02-03T10:00:00-00:00", "links": []}, {"name": "Port Bindings Extended", "alias": "binding-extended", "description": "Expose port bindings of a virtual port to external application", "updated": "2017-07-17T10:00:00-00:00", "links": []}, {"name": "Port Security", "alias": "port-security", "description": "Provides port security", "updated": "2012-07-23T10:00:00-00:00", "links": []}, {"name": "project_id field enabled", "alias": "project-id", "description": "Extension that indicates that project_id field is enabled.", "updated": "2016-09-09T09:09:09-09:09", "links": []}, {"name": "Provid 2026-01-22 15:35:08.877360 DEBUG keystoneauth.session GET call to network for https://38.102.83.245/networking/v2.0/extensions used request id req-f9fc5625-ffaf-4ea9-ae52-11f6ec03f0fa 2026-01-22 15:35:08.978585 DEBUG novaclient.v2.client REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/compute/v2.1/limits?reserved=1 -H "Accept: application/json" -H "User-Agent: python-novaclient" -H "X-Auth-Token: {SHA256}67188f7add57a12267c43903cd8f028a716c100edc317ad0982be56c7c7f4b6c" 2026-01-22 15:35:08.980835 WARNING neutronclient.v2_0.client The python binding code in neutronclient is deprecated in favor of OpenstackSDK, please use that as this will be removed in a future release. 2026-01-22 15:35:08.999481 DEBUG cinderclient.client 2026-01-22 15:35:08.999627 REQ: curl -i https://38.102.83.245/volume/v3/limits?tenant_id=bd06cedd48b54c8899cea4fd7ce9ecac -X GET-H 'X-Auth-Token: {SHA1}8a501f7c63fb373cbd42490ea9e2cef54d616551'-H 'X-Auth-Project-Id: bd06cedd48b54c8899cea4fd7ce9ecac'-H 'User-Agent: python-cinderclient'-H 'Accept: application/json'-H 'OpenStack-API-Version: volume 3.55' 2026-01-22 15:35:08.999638 2026-01-22 15:35:09.001891 DEBUG:stevedore._cache:reading /opt/stack/.cache/python-entrypoints/5cd8364f500557c769bea062f99ff803ce4ab6ae95d947572910d59f85edc24e 2026-01-22 15:35:09.008059 DEBUG neutronclient.client REQ: b'curl -i https://38.102.83.245/networking/v2.0/quotas/bd06cedd48b54c8899cea4fd7ce9ecac/details -X GET -H "X-Auth-Token: {SHA256}75c2268587d00342fd4eafe90880ae2297afba5e4ac94f3d98d29a08f2904781" -H "User-Agent: python-neutronclient"' 2026-01-22 15:35:09.056315 DEBUG cinderclient.client RESP: [200] {'Date': 'Thu, 22 Jan 2026 15:35:09 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'x-compute-request-id': 'req-001f44f4-c33b-47f8-ad24-62c7a2fc1afc', 'Content-Length': '302', 'OpenStack-API-Version': 'volume 3.55', 'Vary': 'OpenStack-API-Version', 'x-openstack-request-id': 'req-001f44f4-c33b-47f8-ad24-62c7a2fc1afc', 'Connection': 'close'} 2026-01-22 15:35:09.056339 RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalVolumes": 10, "maxTotalSnapshots": 10, "maxTotalVolumeGigabytes": 1000, "maxTotalBackups": 10, "maxTotalBackupGigabytes": 1000, "totalVolumesUsed": 0, "totalGigabytesUsed": 0, "totalSnapshotsUsed": 0, "totalBackupsUsed": 0, "totalBackupGigabytesUsed": 0}}} 2026-01-22 15:35:09.056345 2026-01-22 15:35:09.066677 DEBUG novaclient.v2.client RESP: [200] Connection: close Content-Length: 511 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:08 GMT OpenStack-API-Version: compute 2.1 Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: OpenStack-API-Version,X-OpenStack-Nova-API-Version X-OpenStack-Nova-API-Version: 2.1 x-compute-request-id: req-d3a788d5-ddad-4548-add6-8b076cef34ca x-openstack-request-id: req-d3a788d5-ddad-4548-add6-8b076cef34ca 2026-01-22 15:35:09.066911 DEBUG novaclient.v2.client RESP BODY: {"limits": {"rate": [], "absolute": {"maxTotalCores": 20, "maxPersonality": 5, "maxPersonalitySize": 10240, "maxTotalInstances": 10, "maxTotalKeypairs": 100, "maxServerMeta": 128, "maxImageMeta": 128, "maxTotalRAMSize": 51200, "maxServerGroups": 10, "maxServerGroupMembers": 10, "maxTotalFloatingIps": -1, "maxSecurityGroups": -1, "maxSecurityGroupRules": -1, "totalRAMUsed": 0, "totalCoresUsed": 0, "totalInstancesUsed": 0, "totalFloatingIpsUsed": 0, "totalSecurityGroupsUsed": 0, "totalServerGroupsUsed": 0}}} 2026-01-22 15:35:09.067019 DEBUG novaclient.v2.client GET call to compute for https://38.102.83.245/compute/v2.1/limits?reserved=1 used request id req-d3a788d5-ddad-4548-add6-8b076cef34ca 2026-01-22 15:35:09.075179 DEBUG neutronclient.client RESP: 200 {'Date': 'Thu, 22 Jan 2026 15:35:09 GMT', 'Server': 'Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12', 'Content-Type': 'application/json', 'Content-Length': '507', 'x-openstack-request-id': 'req-749f93f7-4a6e-4c61-9687-fe801cbb36af', 'Connection': 'close'} {"quota": {"network": {"limit": 100, "used": 0, "reserved": 0}, "subnet": {"limit": 100, "used": 0, "reserved": 0}, "subnetpool": {"limit": -1, "used": 0, "reserved": 0}, "port": {"limit": 500, "used": 0, "reserved": 0}, "router": {"limit": 10, "used": 0, "reserved": 0}, "floatingip": {"limit": 50, "used": 0, "reserved": 0}, "rbac_policy": {"limit": 10, "used": 0, "reserved": 0}, "security_group": {"limit": 10, "used": 0, "reserved": 0}, "security_group_rule": {"limit": 100, "used": 0, "reserved": 0}}} 2026-01-22 15:35:09.075339 DEBUG neutronclient.client GET call to neutron for https://38.102.83.245/networking/v2.0/quotas/bd06cedd48b54c8899cea4fd7ce9ecac/details used request id req-749f93f7-4a6e-4c61-9687-fe801cbb36af 2026-01-22 15:35:10.097658 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects? -H "Accept: application/json" -H "User-Agent: python-keystoneclient" -H "X-Auth-Token: {SHA256}fce15eca26c7cab812a6db72e92d38d934b767adb4cfea96fa120b03ba70ae22" 2026-01-22 15:35:10.118171 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 521 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:10 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-9608796a-cf7b-49ea-a7df-9af12c803bde 2026-01-22 15:35:10.118388 DEBUG keystoneauth.session RESP BODY: {"projects": [{"id": "bd06cedd48b54c8899cea4fd7ce9ecac", "name": "tempest-TestDashboardBasicOps-2141911784", "domain_id": "default", "description": "tempest-TestDashboardBasicOps-2141911784-desc", "enabled": true, "parent_id": "default", "is_domain": false, "tags": [], "options": {}, "links": {"self": "https://38.102.83.245/identity/v3/projects/bd06cedd48b54c8899cea4fd7ce9ecac"}}], "links": {"next": null, "self": "https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects", "previous": null}} 2026-01-22 15:35:10.118405 2026-01-22 15:35:10.118501 DEBUG keystoneauth.session GET call to identity for https://38.102.83.245/identity/v3/users/caf4740a70e34d55b3bb839cdfc1d5f9/projects used request id req-9608796a-cf7b-49ea-a7df-9af12c803bde 2026-01-22 15:35:10.146104 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml. 2026-01-22 15:35:10.409699 DEBUG:stevedore.extension:found extension EntryPoint(name='http', value='oslo_policy._external:HttpCheck', group='oslo.policy.rule_checks') 2026-01-22 15:35:10.410452 DEBUG:stevedore.extension:found extension EntryPoint(name='https', value='oslo_policy._external:HttpsCheck', group='oslo.policy.rule_checks') 2026-01-22 15:35:10.450978 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-22 15:35:10.634424 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/keystone_policy.yaml 2026-01-22 15:35:10.637272 DEBUG openstack_auth.policy adding enforcer for service: identity 2026-01-22 15:35:10.638114 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml. 2026-01-22 15:35:10.794838 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: os_compute_api:os-flavor-extra-specs:index deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-22 15:35:10.794865 warnings.warn( 2026-01-22 15:35:10.800933 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-22 15:35:10.916326 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.yaml 2026-01-22 15:35:10.916577 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-22 15:35:10.917158 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/nova_policy.d/api-extensions.yaml 2026-01-22 15:35:10.918991 DEBUG openstack_auth.policy adding enforcer for service: compute 2026-01-22 15:35:10.919604 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml. 2026-01-22 15:35:11.066832 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1591: DeprecationWarning: volume_extension:quotas:show deprecated without deprecated_reason or deprecated_since. This will be an error in a future release 2026-01-22 15:35:11.066859 warnings.warn( 2026-01-22 15:35:11.073137 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-22 15:35:11.163487 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/cinder_policy.yaml 2026-01-22 15:35:11.165088 DEBUG openstack_auth.policy adding enforcer for service: volume 2026-01-22 15:35:11.165722 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml. 2026-01-22 15:35:11.309366 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-22 15:35:11.334354 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/glance_policy.yaml 2026-01-22 15:35:11.335041 DEBUG openstack_auth.policy adding enforcer for service: image 2026-01-22 15:35:11.335708 DEBUG oslo_policy.policy No default policy file present, picking the configured one: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml. 2026-01-22 15:35:11.637236 DEBUG oslo_policy._cache_handler Reloading cached file /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-22 15:35:11.814347 DEBUG oslo_policy.policy Reloaded policy file: /opt/stack/horizon/openstack_dashboard/conf/neutron_policy.yaml 2026-01-22 15:35:11.818409 DEBUG openstack_auth.policy adding enforcer for service: network 2026-01-22 15:35:11.818851 DEBUG oslo_policy.policy enforce: rule="get_images" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.818969 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "get_images": "rule:context_is_admin or (role:reader and project_id:%(project_id)s)" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:11.818985 warnings.warn(msg) 2026-01-22 15:35:11.819929 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-keypairs:index" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.820027 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-keypairs:index": "(rule:context_is_admin) or user_id:%(user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:11.820032 warnings.warn(msg) 2026-01-22 15:35:11.820704 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-server-groups:index" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.820767 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "os_compute_api:os-server-groups:index": "rule:project_reader_or_admin" failed scope check. The token used to make the request was domain scoped but the policy requires ['project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:11.820771 warnings.warn(msg) 2026-01-22 15:35:11.821603 DEBUG oslo_policy.policy enforce: rule="volume:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.822196 DEBUG oslo_policy.policy enforce: rule="backup:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.822824 DEBUG oslo_policy.policy enforce: rule="volume:get_all_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.823419 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.824022 DEBUG oslo_policy.policy enforce: rule="group:get_all" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.834633 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.835395 DEBUG oslo_policy.policy enforce: rule="group:get_all_group_snapshots" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.846894 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.848017 DEBUG oslo_policy.policy enforce: rule="os_compute_api:os-hypervisors" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.848082 DEBUG oslo_policy.policy Rule [os_compute_api:os-hypervisors] does not exist 2026-01-22 15:35:11.848472 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.848532 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:11.848945 DEBUG oslo_policy.policy enforce: rule="compute_extension:aggregates" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.848993 DEBUG oslo_policy.policy Rule [compute_extension:aggregates] does not exist 2026-01-22 15:35:11.849398 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.849463 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:11.849873 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.850463 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.850958 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.851442 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.851880 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.852325 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.852731 DEBUG oslo_policy.policy enforce: rule="volume_extension:types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.852780 DEBUG oslo_policy.policy Rule [volume_extension:types_manage] does not exist 2026-01-22 15:35:11.853085 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.853129 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:11.853518 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.853945 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.854377 DEBUG oslo_policy.policy enforce: rule="group:group_types_manage" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.854433 DEBUG oslo_policy.policy Rule [group:group_types_manage] does not exist 2026-01-22 15:35:11.854796 DEBUG oslo_policy.policy enforce: rule="default" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.854854 DEBUG oslo_policy.policy Rule [default] does not exist 2026-01-22 15:35:11.855420 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.855844 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.856284 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.857183 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.857705 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.858068 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.858578 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.859094 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.859526 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.859918 DEBUG oslo_policy.policy enforce: rule="admin_required" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.860366 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.860772 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.861244 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.861747 DEBUG oslo_policy.policy enforce: rule="context_is_admin" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.862183 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.863146 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.864120 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.865010 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.866020 DEBUG oslo_policy.policy enforce: rule="identity:get_user" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.867061 DEBUG oslo_policy.policy enforce: rule="identity:list_groups" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.868801 DEBUG oslo_policy.policy enforce: rule="identity:list_roles" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.868928 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_roles": "rule:admin_required or (role:reader and system_scope:all)" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:11.868933 warnings.warn(msg) 2026-01-22 15:35:11.869564 DEBUG openstack_dashboard.api.keystone Creating a new keystoneclient connection to https://38.102.83.245/identity/v3. 2026-01-22 15:35:11.872464 DEBUG keystoneauth.session REQ: curl -g -i --cacert "/opt/stack/data/ca-bundle.pem" -X GET https://38.102.83.245/identity/v3 -H "Accept: application/json" -H "Forwarded: for=::1;by=openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" -H "User-Agent: openstack_dashboard keystoneauth1/5.13.0 python-requests/2.32.5 CPython/3.12.12" 2026-01-22 15:35:11.882116 DEBUG keystoneauth.session RESP: [200] Connection: close Content-Length: 258 Content-Type: application/json Date: Thu, 22 Jan 2026 15:35:11 GMT Server: Apache/2.4.63 (CentOS Stream) OpenSSL/3.5.1 mod_wsgi/5.0.0 Python/3.12 Vary: X-Auth-Token x-openstack-request-id: req-9fa988ae-2561-430d-957d-ab48c438a111 2026-01-22 15:35:11.882229 DEBUG keystoneauth.session RESP BODY: {"version": {"id": "v3.14", "status": "stable", "updated": "2020-04-07T00:00:00Z", "links": [{"rel": "self", "href": "https://38.102.83.245/identity/v3/"}], "media-types": [{"base": "application/json", "type": "application/vnd.openstack.identity-v3+json"}]}} 2026-01-22 15:35:11.882297 DEBUG keystoneauth.session GET call to https://38.102.83.245/identity/v3 used request id req-9fa988ae-2561-430d-957d-ab48c438a111 2026-01-22 15:35:11.882945 DEBUG oslo_policy.policy enforce: rule="identity:list_credentials" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.883022 /usr/local/lib/python3.12/site-packages/oslo_policy/policy.py:1133: UserWarning: Policy "identity:list_credentials": "(role:reader and system_scope:all) or user_id:%(target.credential.user_id)s" failed scope check. The token used to make the request was domain scoped but the policy requires ['system', 'project'] scope. This behavior may change in the future where using the intended scope is required 2026-01-22 15:35:11.883027 warnings.warn(msg) 2026-01-22 15:35:11.883831 DEBUG oslo_policy.policy enforce: rule="identity:get_domain" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.884733 DEBUG oslo_policy.policy enforce: rule="identity:list_domains" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.885671 DEBUG oslo_policy.policy enforce: rule="identity:list_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"} 2026-01-22 15:35:11.886530 DEBUG oslo_policy.policy enforce: rule="identity:list_user_projects" creds={"domain_id": "default", "is_admin": false, "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_name": "tempest-TestDashboardBasicOps-2141911784", "roles": ["member", "reader"], "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9", "username": "tempest-TestDashboardBasicOps-2141911784-project-member"} target={"domain_id": "default", "group.domain_id": "default", "project.domain_id": "default", "project.id": "bd06cedd48b54c8899cea4fd7ce9ecac", "project_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "tenant_id": "bd06cedd48b54c8899cea4fd7ce9ecac", "user.domain_id": "default", "user.id": "caf4740a70e34d55b3bb839cdfc1d5f9", "user_id": "caf4740a70e34d55b3bb839cdfc1d5f9"}