Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2016-12-02 16:07:50.637 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:50.638 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:50.638 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:50.638 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:50.639 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:50.639 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:50.640 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:50.640 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:50.640 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:50.641 7621 DEBUG keystone.identity.backends.ldap.common [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:50.641 7621 DEBUG keystone.identity.core [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:51.724 7623 DEBUG keystone.middleware.auth [req-f4a2b6f0-23d5-4429-89c5-1605a100e829 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:07:51.725 7623 DEBUG keystone.common.fernet_utils [req-f4a2b6f0-23d5-4429-89c5-1605a100e829 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:51.780 7623 DEBUG keystone.middleware.auth [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=7czr-zPMS56uiHvc7A39Dg, audit_chain_id=7czr-zPMS56uiHvc7A39Dg) at 0x7f9f691bac80>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:07:51.780 7623 INFO keystone.common.wsgi [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:07:51.781 7623 DEBUG keystone.common.controller [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:07:51.781 7623 DEBUG keystone.common.fernet_utils [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:51.789 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.789 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.790 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.790 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.790 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.791 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.792 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.792 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:51.792 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:51.796 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:51.804 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.804 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.804 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.805 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.805 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.806 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.806 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.806 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.807 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.807 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.808 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.808 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:51.828 7623 DEBUG keystone.policy.backends.rules [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=7czr-zPMS56uiHvc7A39Dg, audit_chain_id=7czr-zPMS56uiHvc7A39Dg) at 0x7f9f691bac80>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:07:51.828 7623 DEBUG keystone.common.controller [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:07:51.829 7623 DEBUG keystone.common.fernet_utils [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:51.837 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.837 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.837 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.837 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.838 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.839 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.839 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.839 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:51.839 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:51.841 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:51.848 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.849 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.849 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.849 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.849 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.850 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.851 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.851 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:51.851 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:51.851 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:51.852 7623 DEBUG keystone.identity.backends.ldap.common [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:51.852 7623 DEBUG keystone.identity.core [req-503fde11-5a4d-4730-9322-c7b3d5776755 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:51.954 7625 DEBUG keystone.middleware.auth [req-c8311b22-bb25-453c-8ccd-e54b550405c4 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:07:51.954 7625 DEBUG keystone.common.fernet_utils [req-c8311b22-bb25-453c-8ccd-e54b550405c4 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.008 7625 DEBUG keystone.middleware.auth [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=a6sLLYRmQ1O3KgJjD35cOQ, audit_chain_id=a6sLLYRmQ1O3KgJjD35cOQ) at 0x7f9f68e4ace0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:07:52.009 7625 INFO keystone.common.wsgi [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:07:52.009 7625 DEBUG keystone.common.controller [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:07:52.010 7625 DEBUG keystone.common.fernet_utils [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.020 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.021 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.021 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.021 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:52.023 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:52.031 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.031 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.033 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.033 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.034 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.034 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.034 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.035 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.035 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.054 7625 DEBUG keystone.policy.backends.rules [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=a6sLLYRmQ1O3KgJjD35cOQ, audit_chain_id=a6sLLYRmQ1O3KgJjD35cOQ) at 0x7f9f68e4ace0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:07:52.054 7625 DEBUG keystone.common.controller [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:07:52.055 7625 DEBUG keystone.common.fernet_utils [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.062 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.063 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.063 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.063 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.063 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.064 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.064 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.065 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.065 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:52.067 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:52.074 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.074 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.074 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.074 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.075 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.076 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.076 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.076 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.076 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.076 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.077 7625 DEBUG keystone.identity.backends.ldap.common [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.077 7625 DEBUG keystone.identity.core [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.176 7621 DEBUG keystone.middleware.auth [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:07:52.176 7621 DEBUG keystone.common.fernet_utils [req-2bccc08c-8473-46bd-9cc8-34f0870e22d7 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.231 7621 DEBUG keystone.middleware.auth [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=CEjcR54pSDC6Lk-N_-vG6w, audit_chain_id=CEjcR54pSDC6Lk-N_-vG6w) at 0x7f9f68f0e560>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:07:52.231 7621 INFO keystone.common.wsgi [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:07:52.232 7621 DEBUG keystone.common.controller [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:07:52.232 7621 DEBUG keystone.common.fernet_utils [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.240 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.240 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.240 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.240 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.240 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.242 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.242 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.242 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.242 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:52.244 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:52.252 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.252 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.252 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.253 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.253 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.254 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.254 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.255 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.255 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.255 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.256 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.256 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.275 7621 DEBUG keystone.policy.backends.rules [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=CEjcR54pSDC6Lk-N_-vG6w, audit_chain_id=CEjcR54pSDC6Lk-N_-vG6w) at 0x7f9f68f0e560>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:07:52.276 7621 DEBUG keystone.common.controller [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:07:52.276 7621 DEBUG keystone.common.fernet_utils [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.284 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.284 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.284 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.284 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.284 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.286 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.286 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.286 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.286 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:52.288 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:52.296 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.296 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.297 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.297 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.297 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.298 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.298 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.298 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.299 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.299 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.300 7621 DEBUG keystone.identity.backends.ldap.common [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.300 7621 DEBUG keystone.identity.core [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.565 7620 DEBUG keystone.middleware.auth [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:07:52.565 7620 DEBUG keystone.common.fernet_utils [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:07:52.568 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.568 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.569 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.569 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.569 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.570 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.571 7620 DEBUG keystone.identity.backends.ldap.common [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.571 7620 DEBUG keystone.identity.core [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:07:52.571 7620 DEBUG keystone.identity.core [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:07:52.573 7620 DEBUG keystone.identity.core [req-497dbc5f-949f-40c6-9ba3-f2481f56cfed 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:07:52.580 7620 DEBUG keystone.common.authorization [req-a65e909b-f7cb-4906-b027-6c870eb835ca - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:07:52.580 7620 DEBUG keystone.middleware.auth [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c4395c0>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:07:52.581 7620 INFO keystone.common.wsgi [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:07:52.581 7620 DEBUG keystone.common.controller [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:07:52.582 7620 DEBUG keystone.common.controller [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:07:52.582 7620 DEBUG keystone.policy.backends.rules [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c4395c0>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:07:52.582 7620 DEBUG keystone.common.controller [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:07:52.586 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.586 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.586 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.587 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.587 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.588 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.588 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.589 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:07:52.589 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:07:52.589 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:07:52.590 7620 DEBUG keystone.identity.backends.ldap.common [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:07:52.590 7620 DEBUG keystone.identity.core [req-a65e909b-f7cb-4906-b027-6c870eb835ca 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:51.905 7625 DEBUG keystone.middleware.auth [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:51.907 7625 DEBUG keystone.common.fernet_utils [req-1cc4cb3d-2629-426a-a78b-36d653540732 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:51.965 7625 DEBUG keystone.middleware.auth [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=DziyhkVMT9Km12eA498TNA, audit_chain_id=DziyhkVMT9Km12eA498TNA) at 0x7f9f69111ad0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:51.966 7625 INFO keystone.common.wsgi [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:51.966 7625 DEBUG keystone.common.controller [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:51.967 7625 DEBUG keystone.common.fernet_utils [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:51.974 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:51.975 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:51.975 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:51.975 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:51.975 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:51.976 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:51.977 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:51.977 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:51.977 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:51.979 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:51.986 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:51.987 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:51.987 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:51.987 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:51.987 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:51.988 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:51.988 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:51.989 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:51.989 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:51.989 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:51.990 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:51.990 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.009 7625 DEBUG keystone.policy.backends.rules [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=DziyhkVMT9Km12eA498TNA, audit_chain_id=DziyhkVMT9Km12eA498TNA) at 0x7f9f69111ad0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:52.010 7625 DEBUG keystone.common.controller [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:52.010 7625 DEBUG keystone.common.fernet_utils [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.018 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.020 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.020 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.020 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.020 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:52.022 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:52.030 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.030 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.030 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.030 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.031 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.032 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.033 7625 DEBUG keystone.identity.backends.ldap.common [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.034 7625 DEBUG keystone.identity.core [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.366 7621 DEBUG keystone.middleware.auth [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:52.367 7621 DEBUG keystone.common.fernet_utils [req-943ac271-01cf-4ebb-aa3c-2703733361d3 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.429 7621 DEBUG keystone.middleware.auth [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=7KENCOaiSTCtlf2kxdLk_Q, audit_chain_id=7KENCOaiSTCtlf2kxdLk_Q) at 0x7f9f7fbc15a0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:52.430 7621 INFO keystone.common.wsgi [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:52.430 7621 DEBUG keystone.common.controller [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:52.431 7621 DEBUG keystone.common.fernet_utils [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.439 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.439 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.439 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.440 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.440 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.441 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.442 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.442 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.442 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:52.444 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:52.453 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.453 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.453 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.453 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.454 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.455 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.455 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.455 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.456 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.456 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.457 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.457 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.478 7621 DEBUG keystone.policy.backends.rules [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=7KENCOaiSTCtlf2kxdLk_Q, audit_chain_id=7KENCOaiSTCtlf2kxdLk_Q) at 0x7f9f7fbc15a0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:52.479 7621 DEBUG keystone.common.controller [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:52.479 7621 DEBUG keystone.common.fernet_utils [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.487 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.488 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.488 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.488 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.488 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.490 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.490 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.490 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.490 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:52.493 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:52.501 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.501 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.501 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.501 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.502 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.503 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.503 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.503 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.503 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.504 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.504 7621 DEBUG keystone.identity.backends.ldap.common [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.505 7621 DEBUG keystone.identity.core [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.594 7624 DEBUG keystone.middleware.auth [req-bd3500c2-a099-44a3-8fdc-afb39fe04711 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:52.595 7624 DEBUG keystone.common.fernet_utils [req-bd3500c2-a099-44a3-8fdc-afb39fe04711 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.653 7624 DEBUG keystone.middleware.auth [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=kcMaonWKQw67BechivhXvg, audit_chain_id=kcMaonWKQw67BechivhXvg) at 0x7f9f6cd41e90>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:52.654 7624 INFO keystone.common.wsgi [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:52.654 7624 DEBUG keystone.common.controller [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:52.655 7624 DEBUG keystone.common.fernet_utils [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.662 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.663 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.663 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.663 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.663 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.665 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.665 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.665 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.665 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:52.667 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:52.675 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.675 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.676 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.676 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.676 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.677 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.677 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.678 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.678 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.678 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.679 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.679 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.699 7624 DEBUG keystone.policy.backends.rules [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=kcMaonWKQw67BechivhXvg, audit_chain_id=kcMaonWKQw67BechivhXvg) at 0x7f9f6cd41e90>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:52.700 7624 DEBUG keystone.common.controller [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:52.700 7624 DEBUG keystone.common.fernet_utils [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:52.708 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.708 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.709 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.709 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.709 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.710 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.710 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.711 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:52.711 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:52.713 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:52.721 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.721 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.722 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.722 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.722 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.723 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.723 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.724 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:52.724 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:52.724 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:52.725 7624 DEBUG keystone.identity.backends.ldap.common [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:52.725 7624 DEBUG keystone.identity.core [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.050 7617 DEBUG keystone.middleware.auth [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:53.051 7617 DEBUG keystone.common.fernet_utils [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:53.055 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.055 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.055 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.055 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.055 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.057 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.057 7617 DEBUG keystone.identity.backends.ldap.common [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.057 7617 DEBUG keystone.identity.core [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.057 7617 DEBUG keystone.identity.core [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:53.059 7617 DEBUG keystone.identity.core [req-46a255b5-5703-4c6a-a20c-ced3f5cfd390 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:53.067 7617 DEBUG keystone.common.authorization [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:08:53.067 7617 DEBUG keystone.middleware.auth [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c815530>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:53.068 7617 INFO keystone.common.wsgi [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:08:53.068 7617 DEBUG keystone.common.controller [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:08:53.068 7617 DEBUG keystone.common.controller [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:53.068 7617 DEBUG keystone.policy.backends.rules [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c815530>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:53.069 7617 DEBUG keystone.common.controller [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:08:53.157 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.157 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.157 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.157 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.158 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.159 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.159 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.159 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.160 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.160 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.161 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.161 7617 DEBUG keystone.identity.core [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.251 7622 DEBUG keystone.middleware.auth [req-1f10640a-66ff-498d-b08c-ebd1ffed57b8 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:53.253 7622 DEBUG keystone.common.fernet_utils [req-1f10640a-66ff-498d-b08c-ebd1ffed57b8 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:53.307 7622 DEBUG keystone.middleware.auth [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'95c6a0de3e244f3188e89f2f3aa04663', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=pLKkd2AORRWWSZvE2Oc0FA, audit_chain_id=pLKkd2AORRWWSZvE2Oc0FA) at 0x7f9f68be6830>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:53.308 7622 INFO keystone.common.wsgi [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:53.308 7622 DEBUG keystone.common.controller [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:53.309 7622 DEBUG keystone.common.fernet_utils [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:53.316 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.317 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.317 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.317 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.317 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.319 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.319 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.319 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.319 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:53.322 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:53.329 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.329 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.329 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.330 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.330 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.331 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.331 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.331 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.332 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.332 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.333 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.333 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.351 7622 DEBUG keystone.policy.backends.rules [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'95c6a0de3e244f3188e89f2f3aa04663', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=pLKkd2AORRWWSZvE2Oc0FA, audit_chain_id=pLKkd2AORRWWSZvE2Oc0FA) at 0x7f9f68be6830>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:53.352 7622 DEBUG keystone.common.controller [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:53.352 7622 DEBUG keystone.common.fernet_utils [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:53.360 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.360 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.360 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.360 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.361 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.362 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.362 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.362 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:53.362 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:53.364 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:53.372 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.372 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.372 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.372 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.372 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.373 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.374 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.374 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:53.374 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:53.374 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:53.375 7622 DEBUG keystone.identity.backends.ldap.common [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:53.376 7622 DEBUG keystone.identity.core [req-396b28e7-509e-426a-a518-3153dd6cae7b 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:54.910 7619 DEBUG keystone.middleware.auth [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:54.912 7619 DEBUG keystone.common.fernet_utils [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:54.916 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:54.917 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:54.917 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:54.917 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:54.917 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:54.928 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:54.929 7619 DEBUG keystone.identity.backends.ldap.common [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:54.929 7619 DEBUG keystone.identity.core [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:54.929 7619 DEBUG keystone.identity.core [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:54.931 7619 DEBUG keystone.identity.core [req-6a9b7c7c-bee6-4a75-88d1-fe0a990e05db 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:54.939 7619 DEBUG keystone.common.authorization [req-e765988f-9eed-4395-8fca-c8e93298d46f - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:08:54.939 7619 DEBUG keystone.middleware.auth [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c6035c0>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:54.940 7619 INFO keystone.common.wsgi [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:08:54.940 7619 DEBUG keystone.common.controller [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:08:54.940 7619 DEBUG keystone.common.controller [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:54.940 7619 DEBUG keystone.policy.backends.rules [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c6035c0>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:54.941 7619 DEBUG keystone.common.controller [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:08:54.945 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:54.946 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:54.946 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:54.946 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:54.946 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:54.947 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:54.948 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:54.948 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:54.948 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:54.948 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:54.949 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:54.950 7619 DEBUG keystone.identity.core [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.213 7625 DEBUG keystone.middleware.auth [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:56.213 7625 DEBUG keystone.common.fernet_utils [req-e402892e-2913-4548-905e-fede83ae1f5f 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:56.268 7625 DEBUG keystone.middleware.auth [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=RWrXfPU5QzaI2UrPIKBJwg, audit_chain_id=RWrXfPU5QzaI2UrPIKBJwg) at 0x7f9f691f81c0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:56.269 7625 INFO keystone.common.wsgi [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:56.269 7625 DEBUG keystone.common.controller [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:56.270 7625 DEBUG keystone.common.fernet_utils [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:56.277 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.278 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.278 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.278 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.278 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.280 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.280 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.280 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.280 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:56.283 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:56.291 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.291 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.291 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.291 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.291 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.293 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.293 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.293 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.293 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.293 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.294 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.295 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.315 7625 DEBUG keystone.policy.backends.rules [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=RWrXfPU5QzaI2UrPIKBJwg, audit_chain_id=RWrXfPU5QzaI2UrPIKBJwg) at 0x7f9f691f81c0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:56.315 7625 DEBUG keystone.common.controller [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:56.315 7625 DEBUG keystone.common.fernet_utils [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:56.325 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.325 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.325 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.325 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.325 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.326 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.327 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.327 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.327 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:56.329 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:56.336 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.336 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.336 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.337 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.337 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.338 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.338 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.338 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.339 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.339 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.339 7625 DEBUG keystone.identity.backends.ldap.common [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.340 7625 DEBUG keystone.identity.core [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.926 7616 DEBUG keystone.middleware.auth [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:56.927 7616 DEBUG keystone.common.fernet_utils [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:56.931 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.931 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.932 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.932 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.932 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.933 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.934 7616 DEBUG keystone.identity.backends.ldap.common [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.934 7616 DEBUG keystone.identity.core [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:56.934 7616 DEBUG keystone.identity.core [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:56.937 7616 DEBUG keystone.identity.core [req-c14b60e6-e639-4aa9-ba4e-f2a0524cdf58 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:56.943 7616 DEBUG keystone.common.authorization [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:08:56.944 7616 DEBUG keystone.middleware.auth [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c7a7490>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:56.944 7616 INFO keystone.common.wsgi [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:08:56.945 7616 DEBUG keystone.common.controller [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:08:56.945 7616 DEBUG keystone.common.controller [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:56.945 7616 DEBUG keystone.policy.backends.rules [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c7a7490>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:56.946 7616 DEBUG keystone.common.controller [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:08:56.950 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.950 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.950 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.950 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.950 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.952 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.952 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.952 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:56.952 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:56.953 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:56.953 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:56.954 7616 DEBUG keystone.identity.core [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.543 7619 DEBUG keystone.middleware.auth [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:59.544 7619 DEBUG keystone.common.fernet_utils [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:59.547 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.547 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.547 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.548 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.548 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.549 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.549 7619 DEBUG keystone.identity.backends.ldap.common [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.550 7619 DEBUG keystone.identity.core [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.550 7619 DEBUG keystone.identity.core [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:59.552 7619 DEBUG keystone.identity.core [req-e765988f-9eed-4395-8fca-c8e93298d46f 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:59.558 7619 DEBUG keystone.common.authorization [req-69fa981e-e6be-4916-bdb4-be4f1094e300 - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:08:59.558 7619 DEBUG keystone.middleware.auth [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c8243a0>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:59.559 7619 INFO keystone.common.wsgi [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:08:59.559 7619 DEBUG keystone.common.controller [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:08:59.560 7619 DEBUG keystone.common.controller [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:59.560 7619 DEBUG keystone.policy.backends.rules [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c8243a0>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:59.560 7619 DEBUG keystone.common.controller [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:08:59.565 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.565 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.565 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.565 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.565 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.567 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.567 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.567 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.567 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.567 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.568 7619 DEBUG keystone.identity.backends.ldap.common [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.568 7619 DEBUG keystone.identity.core [req-69fa981e-e6be-4916-bdb4-be4f1094e300 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.654 7624 DEBUG keystone.middleware.auth [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:08:59.655 7624 DEBUG keystone.common.fernet_utils [req-a5c77ca5-320c-4b17-8422-6d007e8d8c0b 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:59.778 7624 DEBUG keystone.middleware.auth [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'95c6a0de3e244f3188e89f2f3aa04663', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=NjgZmQmFTNyp9tPrCl2bkw, audit_chain_id=NjgZmQmFTNyp9tPrCl2bkw) at 0x7f9f6cb9e650>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:08:59.779 7624 INFO keystone.common.wsgi [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:08:59.779 7624 DEBUG keystone.common.controller [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:08:59.780 7624 DEBUG keystone.common.fernet_utils [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:59.787 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.787 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.787 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.788 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.788 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.789 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.789 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.790 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.790 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:59.792 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:59.799 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.799 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.799 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.800 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.800 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.801 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.801 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.801 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.802 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.802 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.803 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.803 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.822 7624 DEBUG keystone.policy.backends.rules [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'95c6a0de3e244f3188e89f2f3aa04663', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=NjgZmQmFTNyp9tPrCl2bkw, audit_chain_id=NjgZmQmFTNyp9tPrCl2bkw) at 0x7f9f6cb9e650>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:08:59.822 7624 DEBUG keystone.common.controller [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:08:59.822 7624 DEBUG keystone.common.fernet_utils [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:08:59.830 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.830 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.830 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.830 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.830 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.832 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.832 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.832 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:08:59.832 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:08:59.834 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:08:59.841 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.842 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.842 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.842 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.842 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.843 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.844 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.844 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:08:59.844 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:08:59.844 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:08:59.845 7624 DEBUG keystone.identity.backends.ldap.common [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:08:59.845 7624 DEBUG keystone.identity.core [req-ecae5a0c-7d2f-4bad-b0e6-7475f4cf02f0 95c6a0de3e244f3188e89f2f3aa04663 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:01.901 7617 DEBUG keystone.middleware.auth [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:09:01.902 7617 DEBUG keystone.common.fernet_utils [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:01.905 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:01.905 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:01.905 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:01.906 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:01.906 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:01.907 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:01.907 7617 DEBUG keystone.identity.backends.ldap.common [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:01.907 7617 DEBUG keystone.identity.core [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:01.908 7617 DEBUG keystone.identity.core [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:09:01.910 7617 DEBUG keystone.identity.core [req-b8e198ef-8c27-4dc1-ac5f-8b692f2163b5 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:09:01.917 7617 DEBUG keystone.common.authorization [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:09:01.917 7617 DEBUG keystone.middleware.auth [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c72afd0>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:09:01.918 7617 INFO keystone.common.wsgi [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:09:01.918 7617 DEBUG keystone.common.controller [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:09:01.918 7617 DEBUG keystone.common.controller [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:09:01.919 7617 DEBUG keystone.policy.backends.rules [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6c72afd0>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:09:01.919 7617 DEBUG keystone.common.controller [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:09:01.923 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:01.924 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:01.924 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:01.924 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:01.924 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:01.925 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:01.925 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:01.926 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:01.926 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:01.926 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:01.927 7617 DEBUG keystone.identity.backends.ldap.common [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:01.927 7617 DEBUG keystone.identity.core [req-d624f28c-24a9-46dd-9e4c-3301f0aa7c8b 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:02.059 7621 DEBUG keystone.middleware.auth [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:09:02.060 7621 DEBUG keystone.common.fernet_utils [req-e2329be4-2ff8-4db8-9f55-75acf3d1346e 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:02.113 7621 DEBUG keystone.middleware.auth [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=1N8YjXHnTGWKo3I-Yrr-hA, audit_chain_id=1N8YjXHnTGWKo3I-Yrr-hA) at 0x7f9f68cd0ed0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:09:02.114 7621 INFO keystone.common.wsgi [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:09:02.114 7621 DEBUG keystone.common.controller [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:09:02.115 7621 DEBUG keystone.common.fernet_utils [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:02.123 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.123 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.123 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.124 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.124 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.125 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.125 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.125 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:02.126 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:09:02.127 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:09:02.135 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.135 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.135 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.135 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.136 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.137 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.137 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.137 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.137 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.137 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.138 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.138 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:02.158 7621 DEBUG keystone.policy.backends.rules [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=1N8YjXHnTGWKo3I-Yrr-hA, audit_chain_id=1N8YjXHnTGWKo3I-Yrr-hA) at 0x7f9f68cd0ed0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:09:02.158 7621 DEBUG keystone.common.controller [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:09:02.158 7621 DEBUG keystone.common.fernet_utils [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:02.166 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.167 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.167 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.167 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.167 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.168 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.168 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.169 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:02.169 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:09:02.171 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:09:02.179 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.179 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.180 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.180 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.180 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.181 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.181 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.181 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:02.182 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:02.182 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:02.182 7621 DEBUG keystone.identity.backends.ldap.common [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:02.183 7621 DEBUG keystone.identity.core [req-67ad9abe-3c72-4204-8800-e75ce687e644 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:03.089 7616 DEBUG keystone.middleware.auth [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:09:03.090 7616 DEBUG keystone.common.fernet_utils [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:03.093 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:03.094 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:03.094 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:03.094 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:03.094 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:03.096 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:03.096 7616 DEBUG keystone.identity.backends.ldap.common [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:03.096 7616 DEBUG keystone.identity.core [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:03.096 7616 DEBUG keystone.identity.core [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Local ID: Brian Bart _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:587
- 2016-12-02 16:09:03.099 7616 DEBUG keystone.identity.core [req-4f46bee2-80cb-46f2-a5af-216ca29954d0 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] Found existing mapping to public ID: 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 _set_domain_id_and_mapping_for_single_ref /usr/lib/python2.7/site-packages/keystone/identity/core.py:600
- 2016-12-02 16:09:03.106 7616 DEBUG keystone.common.authorization [req-ac967b89-c08b-4870-aa9a-97d053391d1e - - - - -] RBAC: Proceeding without project or domain scope token_to_auth_context /usr/lib/python2.7/site-packages/keystone/common/authorization.py:81
- 2016-12-02 16:09:03.107 7616 DEBUG keystone.middleware.auth [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: auth_context: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6cb22b90>, 'access_token_id': None, 'trust_id': None} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:09:03.107 7616 INFO keystone.common.wsgi [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] GET http://admin.cloud.soscip.org:5000/v3/users/1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133/projects
- 2016-12-02 16:09:03.108 7616 DEBUG keystone.common.controller [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Adding query filter params () wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:205
- 2016-12-02 16:09:03.108 7616 DEBUG keystone.common.controller [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorizing identity:list_user_projects(user_id=1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133) _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:09:03.108 7616 DEBUG keystone.policy.backends.rules [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] enforce identity:list_user_projects: {'is_delegated_auth': False, 'user_id': u'1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133', 'user_domain_id': u'8a952992e68344cf83a0f963938f5868', 'trustee_id': None, 'trustor_id': None, 'consumer_id': None, 'token': <KeystoneToken (audit_id=FhA_lJkoT22AvOLWA7871g, audit_chain_id=FhA_lJkoT22AvOLWA7871g) at 0x7f9f6cb22b90>, 'access_token_id': None, 'trust_id': None} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:09:03.109 7616 DEBUG keystone.common.controller [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] RBAC: Authorization granted wrapper /usr/lib/python2.7/site-packages/keystone/common/controller.py:232
- 2016-12-02 16:09:03.113 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:03.113 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:03.114 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:03.114 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:03.114 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=ou=People,dc=sharcnet,dc=ca scope=1 filterstr=(&(cn=Brian Bart)(objectClass=posixAccount)) attrs=['cn', 'userPassword', 'enabled', 'uid', 'mail', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:03.115 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:03.115 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:03.116 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: url=ldap://ldap-uwo.sharcnet.ca _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:574
- 2016-12-02 16:09:03.116 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP init: use_tls=True tls_cacertfile=/etc/openldap/cacerts/sn.pem tls_cacertdir=/etc/openldap/cacerts tls_req_cert=2 tls_avail=1 _common_ldap_initialization /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:578
- 2016-12-02 16:09:03.116 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP search: base=cn=ss_openstack,ou=Group,dc=sharcnet,dc=ca scope=1 filterstr=(&(memberUid=uid=bbart,ou=People,dc=sharcnet,dc=ca)(objectClass=groupOfNames)(cn=*)) attrs=['ou', 'cn', 'description'] attrsonly=0 search_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:934
- 2016-12-02 16:09:03.117 7616 DEBUG keystone.identity.backends.ldap.common [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] LDAP unbind unbind_s /usr/lib/python2.7/site-packages/keystone/identity/backends/ldap/common.py:907
- 2016-12-02 16:09:03.117 7616 DEBUG keystone.identity.core [req-ac967b89-c08b-4870-aa9a-97d053391d1e 1a8ae344bc4eb205ca3620b12c2a48b05c03f63c1fc10b6ff2860046232f8133 - - 8a952992e68344cf83a0f963938f5868 -] ID Mapping - Domain ID: 8a952992e68344cf83a0f963938f5868, Default Driver: False, Domains: False, UUIDs: False, Compatible IDs: True _set_domain_id_and_mapping /usr/lib/python2.7/site-packages/keystone/identity/core.py:569
- 2016-12-02 16:09:09.400 7625 DEBUG keystone.middleware.auth [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Authenticating user token process_request /usr/lib/python2.7/site-packages/keystonemiddleware/auth_token/__init__.py:346
- 2016-12-02 16:09:09.401 7625 DEBUG keystone.common.fernet_utils [req-4d83649e-acfe-4b3b-a035-51461ab37670 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:09.454 7625 DEBUG keystone.middleware.auth [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: auth_context: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=wmKIKFCuRgem6-35OzF2qA, audit_chain_id=wmKIKFCuRgem6-35OzF2qA) at 0x7f9f68c5d2d0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} fill_context /usr/lib/python2.7/site-packages/keystone/middleware/auth.py:243
- 2016-12-02 16:09:09.454 7625 INFO keystone.common.wsgi [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] GET http://controller:35357/v3/auth/tokens
- 2016-12-02 16:09:09.455 7625 DEBUG keystone.common.controller [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorizing identity:validate_token() _build_policy_check_credentials /usr/lib/python2.7/site-packages/keystone/common/controller.py:80
- 2016-12-02 16:09:09.455 7625 DEBUG keystone.common.fernet_utils [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
- 2016-12-02 16:09:09.506 7625 DEBUG keystone.policy.backends.rules [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] enforce identity:validate_token: {'is_delegated_auth': False, 'access_token_id': None, 'user_id': u'7179c3c68e4241c6a7d8bf69f3a27c14', 'roles': [u'admin'], 'user_domain_id': u'default', 'consumer_id': None, 'trustee_id': None, 'is_domain': False, 'trustor_id': None, 'token': <KeystoneToken (audit_id=wmKIKFCuRgem6-35OzF2qA, audit_chain_id=wmKIKFCuRgem6-35OzF2qA) at 0x7f9f68c5d2d0>, 'project_id': u'2f6f5479d02a41f69b92ebc09943bc0c', 'trust_id': None, 'project_domain_id': u'default'} enforce /usr/lib/python2.7/site-packages/keystone/policy/backends/rules.py:76
- 2016-12-02 16:09:09.507 7625 DEBUG keystone.common.controller [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] RBAC: Authorization granted inner /usr/lib/python2.7/site-packages/keystone/common/controller.py:163
- 2016-12-02 16:09:09.507 7625 DEBUG keystone.common.fernet_utils [req-221a5eec-e9de-4aa7-9eb9-46e5bc6b59ee 7179c3c68e4241c6a7d8bf69f3a27c14 2f6f5479d02a41f69b92ebc09943bc0c - default default] Loaded 2 Fernet keys from /etc/keystone/fernet-keys/, but `[fernet_tokens] max_active_keys = 3`; perhaps there have not been enough key rotations to reach `max_active_keys` yet? load_keys /usr/lib/python2.7/site-packages/keystone/common/fernet_utils.py:269
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement