)]}'
{"tempest/api/identity/admin/v3/test_tokens.py":[{"author":{"_account_id":20378,"name":"Trevor McCasland","email":"TM2086@att.com","username":"twm2016"},"change_message_id":"19cf8747f92fb840d1c32c6a76d89038c37c20c1","unresolved":false,"context_lines":[{"line_number":194,"context_line":"    @decorators.idempotent_id(\u002708ed85ce-2ba8-4864-b442-bcc61f16ae89\u0027)"},{"line_number":195,"context_line":"    def test_get_available_project_scopes(self):"},{"line_number":196,"context_line":"        manager_project_id \u003d self.os_primary.credentials.project_id"},{"line_number":197,"context_line":"        admin_user_id \u003d self.os_admin.credentials.user_id"},{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":""},{"line_number":200,"context_line":"        # Grant the user the role on both projects."}],"source_content_type":"text/x-python","patch_set":7,"id":"ffd0ebdf_d41bbe70","line":197,"range":{"start_line":197,"start_character":50,"end_line":197,"end_character":57},"updated":"2019-01-03 21:17:03.000000000","message":"It looks like this user_id is ca978f58df3248cfaa27d4016c04397b but then the put call uses the value None instead.\n\nhttp://logs.openstack.org/24/593124/7/check/tempest-full-test-account-py3/9f430d9/job-output.txt.gz#_2019-01-03_19_05_36_212141","commit_id":"00f5c49414d304a7ed8c3dccbe02854835ad7dd4"},{"author":{"_account_id":20378,"name":"Trevor McCasland","email":"TM2086@att.com","username":"twm2016"},"change_message_id":"af3b89623f43fa3c8cd2f20f418f312a384137f5","unresolved":false,"context_lines":[{"line_number":194,"context_line":"    @decorators.idempotent_id(\u002708ed85ce-2ba8-4864-b442-bcc61f16ae89\u0027)"},{"line_number":195,"context_line":"    def test_get_available_project_scopes(self):"},{"line_number":196,"context_line":"        manager_project_id \u003d self.os_primary.credentials.project_id"},{"line_number":197,"context_line":"        admin_user_id \u003d self.os_admin.credentials.user_id"},{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":""},{"line_number":200,"context_line":"        # Grant the user the role on both projects."}],"source_content_type":"text/x-python","patch_set":7,"id":"ffd0ebdf_5a985769","line":197,"range":{"start_line":197,"start_character":50,"end_line":197,"end_character":57},"in_reply_to":"ffd0ebdf_d41bbe70","updated":"2019-01-03 23:10:55.000000000","message":"here is the log I get when I run this locally. \n\n2019-01-03 16:58:21.607 20178 INFO tempest.lib.common.rest_client [req-21cddb8d-fa44-4ac4-a1a5-81f439ac5deb ] Request (TokensStaticV3TestJSON:test_get_available_project_scopes): 204 PUT http://127.0.0.1/identity/v3/projects/c37eff0bfa2b4d63b05c391b67ea3306/users/a4065d8f11c7e077d7d3db29cbc4987c4b9771b2765cbcf845832e58476f7312/roles/01ce36983ffc412db4325e6697f48fbb 0.050s\n\nmy user is LDAP backed, thats why uid is longer than usual and it is the same user requested in the token log before it.\n\nBody: {\"token\": {\"is_domain\": false, \"methods\": [\"password\"], \"roles\": [{\"id\": \"59e1a428fa184d049666e5ddd4404c47\", \"name\": \"member\"}, {\"id\": \"6d01ce008d0d49019a3ece92c21beda2\", \"name\": \"reader\"}, {\"id\": \"01ce36983ffc412db4325e6697f48fbb\", \"name\": \"admin\"}], \"expires_at\": \"2019-01-03T23:58:21.000000Z\", \"project\": {\"domain\": {\"id\": \"eec56959581c4d15a9abadc9d6794185\", \"name\": \"qa\"}, \"id\": \"8c19ab516d974911938d992be04e21df\", \"name\": \"admin\"}, \"catalog\": [{\"endpoints\": [{\"url\": \"http://127.0.0.1/volume/v2/8c19ab516d974911938d992be04e21df\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"8f0dacbfc8ed46c998a964ae35118c8c\"}], \"type\": \"volumev2\", \"id\": \"1dfb21dee0dd4668af5ef346e4a84556\", \"name\": \"cinderv2\"}, {\"endpoints\": [], \"type\": \"tempest-type-896382670\", \"id\": \"2cae1d032945452fac4d642b59d66f2e\", \"name\": \"tempest-service-2134062948\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/volume/v3/8c19ab516d974911938d992be04e21df\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"859eaa9b038f461a8e80477adb3d3f88\"}], \"type\": \"volumev3\", \"id\": \"63322a30da11447ab0f4432a5ed61f5b\", \"name\": \"cinderv3\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/identity\", \"interface\": \"admin\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"a4d23011be154ba3ad54a7b17659542b\"}, {\"url\": \"http://127.0.0.1/identity\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"d908a9bdc6454c42a7614ec6819b4e57\"}], \"type\": \"identity\", \"id\": \"699c7fa2ef524ee2b1211f5ee56d0f75\", \"name\": \"keystone\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/compute/v2/8c19ab516d974911938d992be04e21df\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"58f33d84310648ba8a2457f0538d245f\"}], \"type\": \"compute_legacy\", \"id\": \"85fe97d9a5e94019b2fd4bed0a314c69\", \"name\": \"nova_legacy\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1:9696/\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"e199e98093fe4af5b20481b1390f29cf\"}], \"type\": \"network\", \"id\": \"b186d80c3a914759a0cf1ed1dcb07255\", \"name\": \"neutron\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/compute/v2.1\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"2c269919a18b4cb38703356db2076bb9\"}], \"type\": \"compute\", \"id\": \"b75100e8846a4d18a4b1de92963a240f\", \"name\": \"nova\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/volume/v1/8c19ab516d974911938d992be04e21df\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"8cfcef210c1c4aefa71ee39647843e6f\"}], \"type\": \"volume\", \"id\": \"bde935c4c1484c84b6844bd3a88dc7c5\", \"name\": \"cinder\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/placement\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"b0e1f3e8cda14231b7ac3e5d6164f644\"}], \"type\": \"placement\", \"id\": \"df729c333f85421084bac849ec4322bb\", \"name\": \"placement\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/volume/v3/8c19ab516d974911938d992be04e21df\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"9f4fa28ee66a4924a017fe315b63424b\"}], \"type\": \"block-storage\", \"id\": \"f228bb8bc041465b83082181a1ea33b7\", \"name\": \"cinder\"}, {\"endpoints\": [], \"type\": \"tempest-type-1239901379\", \"id\": \"f36aca8b3a7a4264b3712a70dbee80fb\", \"name\": \"tempest-service-239925953\"}, {\"endpoints\": [{\"url\": \"http://127.0.0.1/image\", \"interface\": \"public\", \"region\": \"RegionOne\", \"region_id\": \"RegionOne\", \"id\": \"8aa31e1dff624f9db679c429ff3884b9\"}], \"type\": \"image\", \"id\": \"f79c7db713794c26a72a53042d3ecd4d\", \"name\": \"glance\"}], \"user\": {\"password_expires_at\": null, \"domain\": {\"id\": \"e89a6ef6482a45c69609d3824c0577ca\", \"name\": \"Users\"}, \"id\": \"a4065d8f11c7e077d7d3db29cbc4987c4b9771b2765cbcf845832e58476f7312\", \"name\": \"admin\"}, \"audit_ids\": [\"RebGEQGyTVWhKuFv5x8HVA\"], \"issued_at\": \"2019-01-03T22:58:21.000000Z\"}} _log_request_full tempest/lib/common/rest_client.py:437","commit_id":"00f5c49414d304a7ed8c3dccbe02854835ad7dd4"},{"author":{"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},"change_message_id":"593cb7964305ee76b78eb8b8cba10baabd86ef06","unresolved":false,"context_lines":[{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":"        self.role_assignments.list_role_assignments(user_id\u003dadmin_user_id)"},{"line_number":200,"context_line":"        # Grant the user the role on both projects."},{"line_number":201,"context_line":"        self.roles_client.create_user_role_on_project("},{"line_number":202,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"},{"line_number":203,"context_line":"        self.addCleanup("},{"line_number":204,"context_line":"            self.roles_client.delete_role_from_user_on_project,"},{"line_number":205,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"}],"source_content_type":"text/x-python","patch_set":9,"id":"bfb3d3c7_a45926ff","line":202,"range":{"start_line":201,"start_character":0,"end_line":202,"end_character":61},"updated":"2019-05-20 02:22:59.000000000","message":"This grants the admin role to self.os_primary.credentials.project_id, which will cause trouble if cleanup is not done correctly, so maybe \"force_tenant_isolation \u003d False\" is not suitable.","commit_id":"e7933000428614664e9a16c53935107b7e6c739d"},{"author":{"_account_id":20190,"name":"zhufl","email":"zhu.fanglei@zte.com.cn","username":"zhufl"},"change_message_id":"75302d9135c813ea29f82a8fb3eb5de66c2f6570","unresolved":false,"context_lines":[{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":"        self.role_assignments.list_role_assignments(user_id\u003dadmin_user_id)"},{"line_number":200,"context_line":"        # Grant the user the role on both projects."},{"line_number":201,"context_line":"        self.roles_client.create_user_role_on_project("},{"line_number":202,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"},{"line_number":203,"context_line":"        self.addCleanup("},{"line_number":204,"context_line":"            self.roles_client.delete_role_from_user_on_project,"},{"line_number":205,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"}],"source_content_type":"text/x-python","patch_set":9,"id":"9fb8cfa7_b4a220ad","line":202,"range":{"start_line":201,"start_character":0,"end_line":202,"end_character":61},"in_reply_to":"9fb8cfa7_0b49942f","updated":"2019-06-12 01:00:54.000000000","message":"Yes I have to put -1 for the potential risk of granting admin role to normal user, and sorry for not being able to think of any workaround.","commit_id":"e7933000428614664e9a16c53935107b7e6c739d"},{"author":{"_account_id":23625,"name":"Nicolas Helgeson","email":"nh202b@att.com","username":"nhelgeson"},"change_message_id":"100915b8a0b2437102db32332680e98a72eb3597","unresolved":false,"context_lines":[{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":"        self.role_assignments.list_role_assignments(user_id\u003dadmin_user_id)"},{"line_number":200,"context_line":"        # Grant the user the role on both projects."},{"line_number":201,"context_line":"        self.roles_client.create_user_role_on_project("},{"line_number":202,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"},{"line_number":203,"context_line":"        self.addCleanup("},{"line_number":204,"context_line":"            self.roles_client.delete_role_from_user_on_project,"},{"line_number":205,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"}],"source_content_type":"text/x-python","patch_set":9,"id":"9fb8cfa7_0b49942f","line":202,"range":{"start_line":201,"start_character":0,"end_line":202,"end_character":61},"in_reply_to":"9fb8cfa7_ab8e4876","updated":"2019-06-11 18:11:06.000000000","message":"If so, is there a workaround? How else can we test this using pre-provisioned creds?","commit_id":"e7933000428614664e9a16c53935107b7e6c739d"},{"author":{"_account_id":6167,"name":"Ken\u0027ichi Ohmichi","email":"ken1ohmichi@gmail.com","username":"oomichi"},"change_message_id":"6598326378b26de4993f3ba28503da19c61a72a6","unresolved":false,"context_lines":[{"line_number":198,"context_line":"        admin_role_id \u003d self.get_role_by_name(CONF.identity.admin_role)[\u0027id\u0027]"},{"line_number":199,"context_line":"        self.role_assignments.list_role_assignments(user_id\u003dadmin_user_id)"},{"line_number":200,"context_line":"        # Grant the user the role on both projects."},{"line_number":201,"context_line":"        self.roles_client.create_user_role_on_project("},{"line_number":202,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"},{"line_number":203,"context_line":"        self.addCleanup("},{"line_number":204,"context_line":"            self.roles_client.delete_role_from_user_on_project,"},{"line_number":205,"context_line":"            manager_project_id, admin_user_id, admin_role_id)"}],"source_content_type":"text/x-python","patch_set":9,"id":"9fb8cfa7_ab8e4876","line":202,"range":{"start_line":201,"start_character":0,"end_line":202,"end_character":61},"in_reply_to":"bfb3d3c7_a45926ff","updated":"2019-06-11 18:06:15.000000000","message":"@zhufl Does it mean you -1 on current review?","commit_id":"e7933000428614664e9a16c53935107b7e6c739d"}]}
