Max level shown:
12024-10-09T22:51:57.006ZDEBGtest_unauthorized (init_with_steps): Running step start_crdb
22024-10-09T22:51:57.006ZDEBGtest_unauthorized: Starting CRDB
32024-10-09T22:51:57.033ZINFOtest_unauthorized: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpRKHP2j
42024-10-09T22:51:57.033ZINFOtest_unauthorized: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar) to storage directory (/var/tmp/omicron_tmp/.tmpRKHP2j/data)
52024-10-09T22:51:57.049ZINFOtest_unauthorized: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpRKHP2j/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpRKHP2j/listen-url
62024-10-09T22:51:57.050ZINFOtest_unauthorized: cockroach environment: BUILDOMAT_JOB_ID=01J9SJYMATCRAF4F3QS7FBKSKS BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/f461124a98056419fba2953c5624e400ba8e0bb0fca9861773c7ac3b042aeea6.tar GITHUB_BRANCH=clickhouse-inventory-collection GITHUB_REF=refs/heads/clickhouse-inventory-collection GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=632346210ca646c818d7aa831a111e033a94b92c GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/blake3-4218a6ab0b0476c1/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d34656e55e92aa96/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-7ea674a883d240a2/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-314f9daab8629853/out:/work/oxidecomputer/omicron/target/debug/build/ring-e8b5c01317fe1661/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6de7e40dbd3c8cd7/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.80.1-x86_64-unknown-illumos/lib NEXTEST_RUN_ID=b2c3cc9f-c5f1-4193-a632-20d8708574c8 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-9dedaa07c0981ee9/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.80.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1 __NEXTEST_ORIGINAL_CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus
72024-10-09T22:51:58.213ZINFOtest_unauthorized: cockroach pid: 19863
82024-10-09T22:51:58.213ZINFOtest_unauthorized: cockroach listen URL: postgresql://root@[::1]:64376/omicron?sslmode=disable
92024-10-09T22:51:58.213ZDEBGtest_unauthorized (init_with_steps): Running step start_clickhouse
102024-10-09T22:51:58.213ZDEBGtest_unauthorized: Starting Clickhouse
112024-10-09T22:51:59.006ZDEBGtest_unauthorized (init_with_steps): Running step start_gateway_switch0
122024-10-09T22:51:59.006ZDEBGtest_unauthorized: Starting Management Gateway
132024-10-09T22:51:59.140ZDEBGtest_unauthorized (init_with_steps): Running step start_gateway_switch1
142024-10-09T22:51:59.140ZDEBGtest_unauthorized: Starting Management Gateway
152024-10-09T22:51:59.264ZDEBGtest_unauthorized (init_with_steps): Running step start_dendrite_switch0
162024-10-09T22:51:59.264ZDEBGtest_unauthorized: Starting Dendrite for switch0
172024-10-09T22:51:59.322ZDEBGtest_unauthorized (init_with_steps): Running step start_dendrite_switch1
182024-10-09T22:51:59.322ZDEBGtest_unauthorized: Starting Dendrite for switch1
192024-10-09T22:51:59.371ZDEBGtest_unauthorized (init_with_steps): Running step start_mgd_switch0
202024-10-09T22:51:59.371ZDEBGtest_unauthorized: Starting mgd for switch0
212024-10-09T22:51:59.478ZDEBGtest_unauthorized: mgd port is 59451
222024-10-09T22:51:59.478ZDEBGtest_unauthorized (init_with_steps): Running step start_mgd_switch1
232024-10-09T22:51:59.478ZDEBGtest_unauthorized: Starting mgd for switch1
242024-10-09T22:51:59.635ZDEBGtest_unauthorized: mgd port is 58887
252024-10-09T22:51:59.635ZDEBGtest_unauthorized (init_with_steps): Running step record_switch_dns
262024-10-09T22:51:59.635ZDEBGtest_unauthorized: Recording DNS for the switch zones
272024-10-09T22:51:59.635ZDEBGtest_unauthorized (init_with_steps): Running step start_internal_dns
282024-10-09T22:51:59.636ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmpS1TdvM
292024-10-09T22:51:59.901ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
302024-10-09T22:51:59.901ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
312024-10-09T22:51:59.901ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:52319
322024-10-09T22:51:59.901ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:40130 method = GET path = /config
332024-10-09T22:51:59.902ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:40130 method = PUT path = /config
342024-10-09T22:51:59.902ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:40130
352024-10-09T22:51:59.902ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:40130
362024-10-09T22:51:59.903ZDEBGtest_unauthorized (init_with_steps): Running step start_external_dns
372024-10-09T22:51:59.903ZINFOtest_unauthorized (store): opening sled database path = /var/tmp/omicron_tmp/.tmp2OCTQn
382024-10-09T22:51:59.911ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
392024-10-09T22:51:59.911ZINFOtest_unauthorized (store): pruning trees for generations older than 0 keep = 3
402024-10-09T22:51:59.911ZINFOtest_unauthorized (dns): DNS server bound to address kind = dns local_address = [::1]:51984
412024-10-09T22:51:59.911ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:46067 method = GET path = /config
422024-10-09T22:51:59.911ZDEBGtest_unauthorized (http): registered endpoint kind = dns local_addr = [::1]:46067 method = PUT path = /config
432024-10-09T22:51:59.911ZINFOtest_unauthorized (http): listening kind = dns local_addr = [::1]:46067
442024-10-09T22:51:59.912ZDEBGtest_unauthorized (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:46067
452024-10-09T22:51:59.912ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_internal
462024-10-09T22:51:59.912ZDEBGtest_unauthorized: Starting Nexus (internal API)
472024-10-09T22:51:59.912ZINFOtest_unauthorized: setting up nexus server
482024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = Action
492024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = AnyActor
502024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = AuthenticatedActor
512024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = BlueprintConfig
522024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = Database
532024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = DnsConfig
542024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = Fleet
552024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = Inventory
562024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPoolList
572024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSessionList
582024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequestList
592024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloCertificateList
602024-10-09T22:51:59.914ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloIdentityProviderList
612024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUserList
622024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Project
632024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Disk
642024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Snapshot
652024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = ProjectImage
662024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Instance
672024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = IpPool
682024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = InstanceNetworkInterface
692024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Vpc
702024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcRouter
712024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGateway
722024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpPool
732024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = InternetGatewayIpAddress
742024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = RouterRoute
752024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = VpcSubnet
762024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = FloatingIp
772024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Image
782024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloImage
792024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = AddressLot
802024-10-09T22:51:59.915ZINFOtest_unauthorized (ServerContext): registering Oso class class = Blueprint
812024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = LoopbackAddress
822024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = Certificate
832024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = ConsoleSession
842024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAuthRequest
852024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = DeviceAccessToken
862024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = PhysicalDisk
872024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = Rack
882024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = RoleBuiltin
892024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = SshKey
902024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = Silo
912024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloUser
922024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = SiloGroup
932024-10-09T22:51:59.916ZINFOtest_unauthorized (ServerContext): registering Oso class class = IdentityProvider
942024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = SamlIdentityProvider
952024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = Sled
962024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufRepo
972024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = TufArtifact
982024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = Zpool
992024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = Service
1002024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): registering Oso class class = UserBuiltin
1012024-10-09T22:51:59.920ZINFOtest_unauthorized (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
1022024-10-09T22:51:59.945ZINFOtest_unauthorized (ServerContext): Setting up resolver using DNS address: [::1]:52319
1032024-10-09T22:51:59.946ZINFOtest_unauthorized (DnsResolver): new DNS resolver addresses = [[::1]:52319]
1042024-10-09T22:51:59.946ZINFOtest_unauthorized (ServerContext): Setting up qorb pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:64376/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 64376,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n },\n}
1052024-10-09T22:52:00.039ZINFOtest_unauthorized (nexus): Database schema version is up to date desired_version = 109.0.0 found_version = 109.0.0
1062024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /artifacts/{kind}/{name}/{version}
1072024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /bgtasks
1082024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /bgtasks/activate
1092024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /bgtasks/view/{bgtask_name}
1102024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
1112024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
1122024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
1132024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish
1142024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start
1152024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /demo-saga
1162024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /demo-saga/{demo_saga_id}/complete
1172024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /deployment/blueprints/all
1182024-10-09T22:52:00.394ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = DELETE path = /deployment/blueprints/all/{blueprint_id}
1192024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /deployment/blueprints/all/{blueprint_id}
1202024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /deployment/blueprints/import
1212024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /deployment/blueprints/regenerate
1222024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /deployment/blueprints/target
1232024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /deployment/blueprints/target
1242024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = PUT path = /deployment/blueprints/target/enabled
1252024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /disk/{disk_id}/remove-read-only-parent
1262024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = PUT path = /disks/{disk_id}
1272024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /instances/{instance_id}/migrate
1282024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /metrics/collectors
1292024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /metrics/collectors/{collector_id}/producers
1302024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /metrics/producers
1312024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /nat/ipv4/changeset/{from_gen}
1322024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /physical-disk/expunge
1332024-10-09T22:52:00.395ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /probes/{sled}
1342024-10-09T22:52:00.396ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = PUT path = /racks/{rack_id}/initialization-complete
1352024-10-09T22:52:00.396ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /sagas
1362024-10-09T22:52:00.396ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /sagas/{saga_id}
1372024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /sled-agents/{sled_id}
1382024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /sled-agents/{sled_id}
1392024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /sled-agents/{sled_id}/firewall-rules-update
1402024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /sleds/add
1412024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /sleds/expunge
1422024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = GET path = /sleds/uninitialized
1432024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = PUT path = /switch/{switch_id}
1442024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = PUT path = /vmms/{propolis_id}
1452024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): registered endpoint local_addr = 127.0.0.1:58302 method = POST path = /volume/{volume_id}/remove-read-only-parent
1462024-10-09T22:52:00.399ZINFOtest_unauthorized (dropshot_internal): listening local_addr = 127.0.0.1:58302
1472024-10-09T22:52:00.399ZDEBGtest_unauthorized (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:58302
1482024-10-09T22:52:00.400ZINFOtest_unauthorized (SEC): SEC running sec_id = 3173ad92-59fe-4065-97ff-35fc539b0d16
1492024-10-09T22:52:00.400ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1502024-10-09T22:52:00.400ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1512024-10-09T22:52:00.403ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1522024-10-09T22:52:00.404ZDEBGtest_unauthorized (DataLoader): attempting to create built-in users
1532024-10-09T22:52:00.404ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1542024-10-09T22:52:00.404ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1552024-10-09T22:52:00.405ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1562024-10-09T22:52:00.419ZINFOtest_unauthorized (DataLoader): created 5 built-in users
1572024-10-09T22:52:00.420ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1582024-10-09T22:52:00.420ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1592024-10-09T22:52:00.422ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1602024-10-09T22:52:00.422ZDEBGtest_unauthorized (DataLoader): attempting to create built-in roles
1612024-10-09T22:52:00.422ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1622024-10-09T22:52:00.422ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1632024-10-09T22:52:00.422ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1642024-10-09T22:52:00.442ZINFOtest_unauthorized (DataLoader): created 10 built-in roles
1652024-10-09T22:52:00.442ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1662024-10-09T22:52:00.442ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1672024-10-09T22:52:00.444ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1682024-10-09T22:52:00.444ZDEBGtest_unauthorized (DataLoader): attempting to create built-in role assignments
1692024-10-09T22:52:00.444ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1702024-10-09T22:52:00.444ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1712024-10-09T22:52:00.444ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1722024-10-09T22:52:00.771ZINFOtest_unauthorized (DataLoader): created 4 built-in role assignments
1732024-10-09T22:52:00.772ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1742024-10-09T22:52:00.772ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1752024-10-09T22:52:00.775ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1762024-10-09T22:52:00.775ZDEBGtest_unauthorized (DataLoader): attempting to create built-in silos
1772024-10-09T22:52:00.775ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1782024-10-09T22:52:00.775ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1792024-10-09T22:52:00.776ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1802024-10-09T22:52:00.865ZINFOtest_unauthorized (DataLoader): created 2 built-in silos
1812024-10-09T22:52:00.865ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1822024-10-09T22:52:00.867ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1832024-10-09T22:52:00.869ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1842024-10-09T22:52:00.914ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1852024-10-09T22:52:00.914ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1862024-10-09T22:52:00.917ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1872024-10-09T22:52:00.917ZDEBGtest_unauthorized (DataLoader): attempting to create built-in projects
1882024-10-09T22:52:00.917ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1892024-10-09T22:52:00.917ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1902024-10-09T22:52:00.918ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1912024-10-09T22:52:00.928ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
1922024-10-09T22:52:00.929ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
1932024-10-09T22:52:00.929ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1942024-10-09T22:52:00.929ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1952024-10-09T22:52:00.930ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1962024-10-09T22:52:00.936ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1972024-10-09T22:52:00.936ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1982024-10-09T22:52:00.937ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
1992024-10-09T22:52:00.938ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2002024-10-09T22:52:01.011ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2012024-10-09T22:52:01.015ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2022024-10-09T22:52:01.015ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2032024-10-09T22:52:01.015ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2042024-10-09T22:52:01.015ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2052024-10-09T22:52:01.015ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2062024-10-09T22:52:01.016ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2072024-10-09T22:52:01.029ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2082024-10-09T22:52:01.029ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2092024-10-09T22:52:01.029ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2102024-10-09T22:52:01.029ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2112024-10-09T22:52:01.033ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2122024-10-09T22:52:01.042ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2132024-10-09T22:52:01.042ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2142024-10-09T22:52:01.042ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2152024-10-09T22:52:01.043ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2162024-10-09T22:52:01.075ZINFOtest_unauthorized (DataLoader): created built-in services project
2172024-10-09T22:52:01.075ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2182024-10-09T22:52:01.075ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2192024-10-09T22:52:01.078ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2202024-10-09T22:52:01.078ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPCs
2212024-10-09T22:52:01.078ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2222024-10-09T22:52:01.078ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2232024-10-09T22:52:01.078ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2242024-10-09T22:52:01.082ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2252024-10-09T22:52:01.082ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2262024-10-09T22:52:01.083ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2272024-10-09T22:52:01.091ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2282024-10-09T22:52:01.092ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2292024-10-09T22:52:01.092ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2302024-10-09T22:52:01.092ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2312024-10-09T22:52:01.093ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2322024-10-09T22:52:01.099ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2332024-10-09T22:52:01.099ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2342024-10-09T22:52:01.100ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2352024-10-09T22:52:01.100ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2362024-10-09T22:52:01.102ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2372024-10-09T22:52:01.102ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2382024-10-09T22:52:01.102ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2392024-10-09T22:52:01.103ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2402024-10-09T22:52:01.174ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2412024-10-09T22:52:01.189ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2422024-10-09T22:52:01.189ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Project" using built-in user
2432024-10-09T22:52:01.189ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2442024-10-09T22:52:01.189ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2452024-10-09T22:52:01.189ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2462024-10-09T22:52:01.189ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2472024-10-09T22:52:01.190ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2482024-10-09T22:52:01.206ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2492024-10-09T22:52:01.206ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2502024-10-09T22:52:01.206ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2512024-10-09T22:52:01.207ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2522024-10-09T22:52:01.212ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2532024-10-09T22:52:01.212ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2542024-10-09T22:52:01.212ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2552024-10-09T22:52:01.213ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2562024-10-09T22:52:01.222ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2572024-10-09T22:52:01.228ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2582024-10-09T22:52:01.228ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2592024-10-09T22:52:01.228ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2602024-10-09T22:52:01.228ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2612024-10-09T22:52:01.254ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2622024-10-09T22:52:01.254ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2632024-10-09T22:52:01.254ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2642024-10-09T22:52:01.254ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2652024-10-09T22:52:01.255ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2662024-10-09T22:52:01.259ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2672024-10-09T22:52:01.259ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2682024-10-09T22:52:01.259ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2692024-10-09T22:52:01.260ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2702024-10-09T22:52:01.276ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2712024-10-09T22:52:01.276ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2722024-10-09T22:52:01.276ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2732024-10-09T22:52:01.277ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2742024-10-09T22:52:01.287ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2752024-10-09T22:52:01.295ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2762024-10-09T22:52:01.296ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2772024-10-09T22:52:01.296ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2782024-10-09T22:52:01.296ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2792024-10-09T22:52:01.329ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2802024-10-09T22:52:01.329ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2812024-10-09T22:52:01.330ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2822024-10-09T22:52:01.338ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2832024-10-09T22:52:01.338ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2842024-10-09T22:52:01.339ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2852024-10-09T22:52:01.342ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2862024-10-09T22:52:01.342ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2872024-10-09T22:52:01.342ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2882024-10-09T22:52:01.342ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2892024-10-09T22:52:01.343ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2902024-10-09T22:52:01.345ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2912024-10-09T22:52:01.345ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2922024-10-09T22:52:01.345ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2932024-10-09T22:52:01.346ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2942024-10-09T22:52:01.348ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2952024-10-09T22:52:01.349ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2962024-10-09T22:52:01.349ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2972024-10-09T22:52:01.350ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2982024-10-09T22:52:01.352ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
2992024-10-09T22:52:01.360ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3002024-10-09T22:52:01.360ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3012024-10-09T22:52:01.360ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3022024-10-09T22:52:01.361ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3032024-10-09T22:52:01.440ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3042024-10-09T22:52:01.440ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3052024-10-09T22:52:01.440ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3062024-10-09T22:52:01.440ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3072024-10-09T22:52:01.441ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3082024-10-09T22:52:01.443ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3092024-10-09T22:52:01.443ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3102024-10-09T22:52:01.443ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3112024-10-09T22:52:01.444ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3122024-10-09T22:52:01.446ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3132024-10-09T22:52:01.446ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3142024-10-09T22:52:01.446ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3152024-10-09T22:52:01.446ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3162024-10-09T22:52:01.449ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3172024-10-09T22:52:01.457ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3182024-10-09T22:52:01.457ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3192024-10-09T22:52:01.457ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3202024-10-09T22:52:01.458ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3212024-10-09T22:52:01.553ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3222024-10-09T22:52:01.553ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3232024-10-09T22:52:01.553ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3242024-10-09T22:52:01.553ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3252024-10-09T22:52:01.554ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3262024-10-09T22:52:01.557ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3272024-10-09T22:52:01.557ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3282024-10-09T22:52:01.557ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3292024-10-09T22:52:01.559ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3302024-10-09T22:52:01.561ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3312024-10-09T22:52:01.561ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3322024-10-09T22:52:01.561ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3332024-10-09T22:52:01.562ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3342024-10-09T22:52:01.564ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3352024-10-09T22:52:01.572ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3362024-10-09T22:52:01.572ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3372024-10-09T22:52:01.572ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3382024-10-09T22:52:01.573ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3392024-10-09T22:52:01.580ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC firewall rules
3402024-10-09T22:52:01.580ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3412024-10-09T22:52:01.581ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3422024-10-09T22:52:01.582ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3432024-10-09T22:52:01.585ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3442024-10-09T22:52:01.585ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3452024-10-09T22:52:01.589ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3462024-10-09T22:52:01.592ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3472024-10-09T22:52:01.592ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3482024-10-09T22:52:01.592ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3492024-10-09T22:52:01.594ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3502024-10-09T22:52:01.594ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3512024-10-09T22:52:01.594ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3522024-10-09T22:52:01.594ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3532024-10-09T22:52:01.595ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3542024-10-09T22:52:01.597ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3552024-10-09T22:52:01.597ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3562024-10-09T22:52:01.597ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3572024-10-09T22:52:01.598ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3582024-10-09T22:52:01.600ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3592024-10-09T22:52:01.600ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3602024-10-09T22:52:01.600ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3612024-10-09T22:52:01.600ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3622024-10-09T22:52:01.602ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3632024-10-09T22:52:01.610ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3642024-10-09T22:52:01.610ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
3652024-10-09T22:52:01.610ZTRACtest_unauthorized (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3662024-10-09T22:52:01.610ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3672024-10-09T22:52:01.610ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3682024-10-09T22:52:01.610ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3692024-10-09T22:52:01.611ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3702024-10-09T22:52:01.612ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3712024-10-09T22:52:01.613ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3722024-10-09T22:52:01.613ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3732024-10-09T22:52:01.613ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3742024-10-09T22:52:01.615ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3752024-10-09T22:52:01.615ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3762024-10-09T22:52:01.615ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3772024-10-09T22:52:01.615ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3782024-10-09T22:52:01.617ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3792024-10-09T22:52:01.627ZDEBGtest_unauthorized (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3802024-10-09T22:52:01.627ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3812024-10-09T22:52:01.627ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3822024-10-09T22:52:01.628ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3832024-10-09T22:52:01.641ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3842024-10-09T22:52:01.641ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3852024-10-09T22:52:01.641ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3862024-10-09T22:52:01.641ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3872024-10-09T22:52:01.642ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3882024-10-09T22:52:01.643ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3892024-10-09T22:52:01.643ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3902024-10-09T22:52:01.644ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3912024-10-09T22:52:01.644ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3922024-10-09T22:52:01.646ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3932024-10-09T22:52:01.646ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3942024-10-09T22:52:01.646ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3952024-10-09T22:52:01.647ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3962024-10-09T22:52:01.649ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
3972024-10-09T22:52:01.660ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3982024-10-09T22:52:01.660ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3992024-10-09T22:52:01.660ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4002024-10-09T22:52:01.662ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4012024-10-09T22:52:01.768ZINFOtest_unauthorized (DataLoader): created built-in VPC firewall rules
4022024-10-09T22:52:01.768ZDEBGtest_unauthorized (DataLoader): attempting to create built-in VPC Subnets
4032024-10-09T22:52:01.768ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4042024-10-09T22:52:01.768ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4052024-10-09T22:52:01.769ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4062024-10-09T22:52:01.773ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4072024-10-09T22:52:01.773ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4082024-10-09T22:52:01.774ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4092024-10-09T22:52:01.776ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4102024-10-09T22:52:01.776ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4112024-10-09T22:52:01.777ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4122024-10-09T22:52:01.780ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4132024-10-09T22:52:01.781ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4142024-10-09T22:52:01.781ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4152024-10-09T22:52:01.781ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4162024-10-09T22:52:01.782ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4172024-10-09T22:52:01.785ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4182024-10-09T22:52:01.785ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4192024-10-09T22:52:01.785ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4202024-10-09T22:52:01.787ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4212024-10-09T22:52:01.789ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4222024-10-09T22:52:01.789ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4232024-10-09T22:52:01.789ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4242024-10-09T22:52:01.790ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4252024-10-09T22:52:01.794ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4262024-10-09T22:52:01.801ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4272024-10-09T22:52:01.801ZTRACtest_unauthorized (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4282024-10-09T22:52:01.801ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4292024-10-09T22:52:01.801ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4302024-10-09T22:52:01.802ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4312024-10-09T22:52:01.809ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4322024-10-09T22:52:01.809ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4332024-10-09T22:52:01.809ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4342024-10-09T22:52:01.810ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4352024-10-09T22:52:01.810ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4362024-10-09T22:52:01.813ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4372024-10-09T22:52:01.813ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4382024-10-09T22:52:01.813ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4392024-10-09T22:52:01.814ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4402024-10-09T22:52:01.816ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4412024-10-09T22:52:01.816ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4422024-10-09T22:52:01.816ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4432024-10-09T22:52:01.817ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4442024-10-09T22:52:01.820ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4452024-10-09T22:52:01.827ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4462024-10-09T22:52:01.835ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4472024-10-09T22:52:01.835ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4482024-10-09T22:52:01.836ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4492024-10-09T22:52:01.863ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4502024-10-09T22:52:01.863ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4512024-10-09T22:52:01.864ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4522024-10-09T22:52:01.874ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4532024-10-09T22:52:01.874ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4542024-10-09T22:52:01.874ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4552024-10-09T22:52:01.874ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4562024-10-09T22:52:01.875ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4572024-10-09T22:52:01.877ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4582024-10-09T22:52:01.877ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4592024-10-09T22:52:01.877ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4602024-10-09T22:52:01.878ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4612024-10-09T22:52:01.879ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4622024-10-09T22:52:01.879ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4632024-10-09T22:52:01.880ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4642024-10-09T22:52:01.881ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4652024-10-09T22:52:01.882ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4662024-10-09T22:52:01.891ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4672024-10-09T22:52:01.891ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4682024-10-09T22:52:01.891ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4692024-10-09T22:52:01.892ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4702024-10-09T22:52:01.959ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4712024-10-09T22:52:01.959ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4722024-10-09T22:52:01.960ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4732024-10-09T22:52:01.964ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4742024-10-09T22:52:01.964ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4752024-10-09T22:52:01.964ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4762024-10-09T22:52:01.964ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4772024-10-09T22:52:01.965ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4782024-10-09T22:52:01.967ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4792024-10-09T22:52:01.967ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4802024-10-09T22:52:01.973ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4812024-10-09T22:52:01.974ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4822024-10-09T22:52:01.977ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4832024-10-09T22:52:01.977ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4842024-10-09T22:52:01.977ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4852024-10-09T22:52:01.978ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4862024-10-09T22:52:01.979ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4872024-10-09T22:52:01.986ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4882024-10-09T22:52:01.993ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4892024-10-09T22:52:01.993ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4902024-10-09T22:52:01.994ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4912024-10-09T22:52:02.043ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4922024-10-09T22:52:02.044ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4932024-10-09T22:52:02.045ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4942024-10-09T22:52:02.050ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4952024-10-09T22:52:02.050ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4962024-10-09T22:52:02.050ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4972024-10-09T22:52:02.050ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
4982024-10-09T22:52:02.051ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4992024-10-09T22:52:02.062ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5002024-10-09T22:52:02.070ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5012024-10-09T22:52:02.070ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5022024-10-09T22:52:02.071ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5032024-10-09T22:52:02.074ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5042024-10-09T22:52:02.074ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5052024-10-09T22:52:02.074ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5062024-10-09T22:52:02.075ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5072024-10-09T22:52:02.077ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5082024-10-09T22:52:02.095ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5092024-10-09T22:52:02.095ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5102024-10-09T22:52:02.095ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5112024-10-09T22:52:02.096ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5122024-10-09T22:52:02.113ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5132024-10-09T22:52:02.114ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5142024-10-09T22:52:02.114ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5152024-10-09T22:52:02.121ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5162024-10-09T22:52:02.122ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5172024-10-09T22:52:02.122ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5182024-10-09T22:52:02.122ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5192024-10-09T22:52:02.123ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5202024-10-09T22:52:02.142ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5212024-10-09T22:52:02.142ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5222024-10-09T22:52:02.142ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5232024-10-09T22:52:02.143ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5242024-10-09T22:52:02.148ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5252024-10-09T22:52:02.148ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5262024-10-09T22:52:02.148ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5272024-10-09T22:52:02.149ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5282024-10-09T22:52:02.158ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5292024-10-09T22:52:02.166ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5302024-10-09T22:52:02.187ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5312024-10-09T22:52:02.189ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5322024-10-09T22:52:02.190ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5332024-10-09T22:52:02.289ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5342024-10-09T22:52:02.290ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5352024-10-09T22:52:02.291ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5362024-10-09T22:52:02.321ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5372024-10-09T22:52:02.322ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5382024-10-09T22:52:02.322ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5392024-10-09T22:52:02.322ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5402024-10-09T22:52:02.323ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5412024-10-09T22:52:02.333ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5422024-10-09T22:52:02.333ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5432024-10-09T22:52:02.333ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5442024-10-09T22:52:02.334ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5452024-10-09T22:52:02.344ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5462024-10-09T22:52:02.344ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5472024-10-09T22:52:02.344ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5482024-10-09T22:52:02.344ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5492024-10-09T22:52:02.346ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5502024-10-09T22:52:02.358ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5512024-10-09T22:52:02.358ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5522024-10-09T22:52:02.358ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5532024-10-09T22:52:02.359ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5542024-10-09T22:52:02.366ZINFOtest_unauthorized (DataLoader): created built-in services vpc subnets
5552024-10-09T22:52:02.366ZINFOtest_unauthorized (DataLoader): created built-in services vpc
5562024-10-09T22:52:02.366ZTRACtest_unauthorized (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5572024-10-09T22:52:02.366ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5582024-10-09T22:52:02.369ZDEBGtest_unauthorized (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5592024-10-09T22:52:02.369ZDEBGtest_unauthorized (DataLoader): attempting to create silo users
5602024-10-09T22:52:02.369ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5612024-10-09T22:52:02.369ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5622024-10-09T22:52:02.369ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5632024-10-09T22:52:02.379ZINFOtest_unauthorized (DataLoader): created 2 silo users
5642024-10-09T22:52:02.379ZDEBGtest_unauthorized (DataLoader): attempting to create silo user role assignments
5652024-10-09T22:52:02.379ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5662024-10-09T22:52:02.379ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5672024-10-09T22:52:02.380ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5682024-10-09T22:52:02.385ZINFOtest_unauthorized (DataLoader): created 2 silo user role assignments
5692024-10-09T22:52:02.385ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5702024-10-09T22:52:02.385ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5712024-10-09T22:52:02.388ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5722024-10-09T22:52:02.395ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5732024-10-09T22:52:02.395ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5742024-10-09T22:52:02.396ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5752024-10-09T22:52:02.407ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5762024-10-09T22:52:02.407ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5772024-10-09T22:52:02.407ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5782024-10-09T22:52:02.407ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5792024-10-09T22:52:02.408ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5802024-10-09T22:52:02.409ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5812024-10-09T22:52:02.412ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5822024-10-09T22:52:02.412ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5832024-10-09T22:52:02.412ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5842024-10-09T22:52:02.413ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5852024-10-09T22:52:02.421ZTRACtest_unauthorized (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5862024-10-09T22:52:02.421ZTRACtest_unauthorized (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5872024-10-09T22:52:02.421ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5882024-10-09T22:52:02.421ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5892024-10-09T22:52:02.422ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5902024-10-09T22:52:02.423ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5912024-10-09T22:52:02.426ZDEBGtest_unauthorized (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5922024-10-09T22:52:02.426ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5932024-10-09T22:52:02.426ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5942024-10-09T22:52:02.427ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5952024-10-09T22:52:02.583ZTRACtest_unauthorized (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5962024-10-09T22:52:02.583ZDEBGtest_unauthorized (DataLoader): roles roles = RoleSet { roles: {} }
5972024-10-09T22:52:02.584ZDEBGtest_unauthorized (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5982024-10-09T22:52:02.588ZINFOtest_unauthorized (nexus): populate complete
5992024-10-09T22:52:02.588ZINFOtest_unauthorized (nexus): activating background tasks
6002024-10-09T22:52:02.591ZDEBGtest_unauthorized (init_with_steps): Running step start_sled1
6012024-10-09T22:52:02.592ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6022024-10-09T22:52:02.684ZINFOtest_unauthorized (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6032024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6042024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6052024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6062024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6072024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /cockroachdb sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6082024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6092024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6102024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6112024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6122024-10-09T22:52:02.692ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6132024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6142024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6152024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6162024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6172024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6182024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6192024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6202024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6212024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6222024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6232024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6242024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /timesync sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6252024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /update sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6262024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6272024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6282024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6292024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6302024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6312024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6322024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6332024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6342024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6352024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6362024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6372024-10-09T22:52:02.693ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6382024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6392024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6402024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6412024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6422024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6432024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6442024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6452024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6462024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6472024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6482024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6492024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = POST path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6502024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6512024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6522024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36561 method = GET path = /zpools sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6532024-10-09T22:52:02.694ZINFOtest_unauthorized (dropshot): listening local_addr = [::1]:36561 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6542024-10-09T22:52:02.694ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:36561 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6552024-10-09T22:52:02.694ZDEBGtest_unauthorized (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6562024-10-09T22:52:02.694ZDEBGtest_unauthorized (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:58302/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
6572024-10-09T22:52:02.695ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:63012
6582024-10-09T22:52:02.695ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6592024-10-09T22:52:02.695ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6602024-10-09T22:52:02.697ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
6612024-10-09T22:52:02.697ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6622024-10-09T22:52:02.698ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6632024-10-09T22:52:02.698ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6642024-10-09T22:52:02.698ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6652024-10-09T22:52:02.698ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6662024-10-09T22:52:02.699ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6672024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 50.878\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6682024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6692024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6702024-10-09T22:52:02.699ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
6712024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6722024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6732024-10-09T22:52:02.699ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6742024-10-09T22:52:02.700ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6752024-10-09T22:52:02.700ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6762024-10-09T22:52:02.700ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6772024-10-09T22:52:02.700ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 35.658\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6782024-10-09T22:52:02.700ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
6792024-10-09T22:52:02.700ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2024-10-09 22:42:02.700162746 UTC
6802024-10-09T22:52:02.700ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
6812024-10-09T22:52:02.700ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
6822024-10-09T22:52:02.701ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
6832024-10-09T22:52:02.701ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
6842024-10-09T22:52:02.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
6852024-10-09T22:52:02.701ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6862024-10-09T22:52:02.701ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
6872024-10-09T22:52:02.701ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
6882024-10-09T22:52:02.716ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
6892024-10-09T22:52:02.716ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 1 reason = Timeout
6902024-10-09T22:52:02.716ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
6912024-10-09T22:52:02.716ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
6922024-10-09T22:52:02.718ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
6932024-10-09T22:52:02.718ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
6942024-10-09T22:52:02.718ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
6952024-10-09T22:52:02.718ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
6962024-10-09T22:52:02.719ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
6972024-10-09T22:52:02.719ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
6982024-10-09T22:52:02.719ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
6992024-10-09T22:52:02.719ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig
7002024-10-09T22:52:02.719ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7012024-10-09T22:52:02.719ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
7022024-10-09T22:52:02.719ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7032024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
7042024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
7052024-10-09T22:52:02.722ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
7062024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 52.098\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7072024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7082024-10-09T22:52:02.722ZWARNtest_unauthorized (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7092024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 46.078\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7102024-10-09T22:52:02.722ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
7112024-10-09T22:52:02.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
7122024-10-09T22:52:02.723ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7132024-10-09T22:52:02.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
7142024-10-09T22:52:02.723ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7152024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
7162024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
7172024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 47.638\u{b5}s iteration = 1 status = {"error":"task disabled"}
7182024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7192024-10-09T22:52:02.724ZINFOtest_unauthorized (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7202024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 107.175\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7212024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7222024-10-09T22:52:02.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
7232024-10-09T22:52:02.724ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7242024-10-09T22:52:02.724ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
7252024-10-09T22:52:02.724ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
7262024-10-09T22:52:02.726ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
7272024-10-09T22:52:02.726ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7282024-10-09T22:52:02.726ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
7292024-10-09T22:52:02.726ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7302024-10-09T22:52:02.726ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
7312024-10-09T22:52:02.726ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7322024-10-09T22:52:02.727ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7332024-10-09T22:52:02.727ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7342024-10-09T22:52:02.728ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
7352024-10-09T22:52:02.728ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7362024-10-09T22:52:02.733ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
7372024-10-09T22:52:02.733ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7382024-10-09T22:52:02.733ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
7392024-10-09T22:52:02.733ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7402024-10-09T22:52:02.734ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
7412024-10-09T22:52:02.734ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7422024-10-09T22:52:02.734ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
7432024-10-09T22:52:02.735ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7442024-10-09T22:52:02.735ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7452024-10-09T22:52:02.736ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7462024-10-09T22:52:02.736ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
7472024-10-09T22:52:02.736ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7482024-10-09T22:52:02.736ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
7492024-10-09T22:52:02.737ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7502024-10-09T22:52:02.737ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
7512024-10-09T22:52:02.737ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7522024-10-09T22:52:02.737ZINFOtest_unauthorized (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7532024-10-09T22:52:02.738ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_updater elapsed = 443.559\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7542024-10-09T22:52:02.738ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7552024-10-09T22:52:02.738ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
7562024-10-09T22:52:02.738ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7572024-10-09T22:52:02.739ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7582024-10-09T22:52:02.739ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7592024-10-09T22:52:02.739ZDEBGtest_unauthorized (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7602024-10-09T22:52:02.739ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
7612024-10-09T22:52:02.739ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7622024-10-09T22:52:02.740ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7632024-10-09T22:52:02.741ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7642024-10-09T22:52:02.741ZINFOtest_unauthorized (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7652024-10-09T22:52:02.741ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
7662024-10-09T22:52:02.744ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7672024-10-09T22:52:02.744ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
7682024-10-09T22:52:02.744ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7692024-10-09T22:52:02.745ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
7702024-10-09T22:52:02.745ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7712024-10-09T22:52:02.745ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
7722024-10-09T22:52:02.746ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7732024-10-09T22:52:02.746ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7742024-10-09T22:52:02.746ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7752024-10-09T22:52:02.746ZDEBGtest_unauthorized (SagaRecoverer): listing candidate sagas for recovery
7762024-10-09T22:52:02.747ZTRACtest_unauthorized (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database
7772024-10-09T22:52:02.747ZDEBGtest_unauthorized (SagaRecoverer): roles roles = RoleSet { roles: {} }
7782024-10-09T22:52:02.747ZDEBGtest_unauthorized (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database result = Ok(())
7792024-10-09T22:52:02.747ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7802024-10-09T22:52:02.748ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
7812024-10-09T22:52:02.748ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
7822024-10-09T22:52:02.748ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
7832024-10-09T22:52:02.749ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
7842024-10-09T22:52:02.749ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 144.003\u{b5}s iteration = 1 status = {"errors":[],"requests_created_ok":[],"start_invoked_ok":[]}
7852024-10-09T22:52:02.749ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
7862024-10-09T22:52:02.750ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 139.193\u{b5}s iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
7872024-10-09T22:52:02.750ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
7882024-10-09T22:52:02.750ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 171.332\u{b5}s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[]}
7892024-10-09T22:52:02.750ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
7902024-10-09T22:52:02.750ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 126.114\u{b5}s iteration = 1 status = {"errors":[],"records_set_to_done":[]}
7912024-10-09T22:52:02.752ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:63012 req_id = 4b59fafb-6ae5-4282-92d6-aae8206220b5 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
7922024-10-09T22:52:02.764ZINFOtest_unauthorized (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
7932024-10-09T22:52:02.770ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
7942024-10-09T22:52:02.770ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7952024-10-09T22:52:02.770ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
7962024-10-09T22:52:02.770ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
7972024-10-09T22:52:02.775ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
7982024-10-09T22:52:02.783ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: d0 72 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .r..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:61541 req_id = d4c35ceb-807e-4581-b015-1f95821d90bb
7992024-10-09T22:52:02.784ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 53362,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61541 req_id = d4c35ceb-807e-4581-b015-1f95821d90bb
8002024-10-09T22:52:02.790ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 53362, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:61541 req_id = d4c35ceb-807e-4581-b015-1f95821d90bb
8012024-10-09T22:52:02.790ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 40 a6 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 @............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:57692 req_id = 34a88103-a9cf-4544-a2e1-939951a3cd38
8022024-10-09T22:52:02.790ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 16550,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57692 req_id = 34a88103-a9cf-4544-a2e1-939951a3cd38
8032024-10-09T22:52:02.793ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 16550, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57692 req_id = 34a88103-a9cf-4544-a2e1-939951a3cd38
8042024-10-09T22:52:02.795ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8052024-10-09T22:52:02.795ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8062024-10-09T22:52:02.796ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
8072024-10-09T22:52:02.798ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8082024-10-09T22:52:02.800ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8092024-10-09T22:52:02.807ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8102024-10-09T22:52:02.807ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 108.818609ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8112024-10-09T22:52:02.807ZWARNtest_unauthorized (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8122024-10-09T22:52:02.807ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 107.933252ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8132024-10-09T22:52:02.873ZINFOtest_unauthorized (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2024-10-09 22:42:02.700162746 UTC pruned = {}
8142024-10-09T22:52:02.874ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 173.758626ms iteration = 1 status = {"expiration":"2024-10-09T22:42:02.700162746Z","pruned":[]}
8152024-10-09T22:52:02.884ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8162024-10-09T22:52:02.884ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 09 a9 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:53221 req_id = 7331f7c7-e888-4e4d-a562-7732a2afa615
8172024-10-09T22:52:02.885ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 2473,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53221 req_id = 7331f7c7-e888-4e4d-a562-7732a2afa615
8182024-10-09T22:52:02.885ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 2473, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:53221 req_id = 7331f7c7-e888-4e4d-a562-7732a2afa615
8192024-10-09T22:52:02.885ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_v4_garbage_collector error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8202024-10-09T22:52:02.886ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = nat_v4_garbage_collector elapsed = 169.548847ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8212024-10-09T22:52:02.888ZTRACtest_unauthorized (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8222024-10-09T22:52:02.909ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 189.907945ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8232024-10-09T22:52:02.910ZTRACtest_unauthorized (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: df d7 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:57391 req_id = ed857cea-c514-4de3-833a-a64027b3d3bc
8242024-10-09T22:52:02.910ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 57303,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57391 req_id = ed857cea-c514-4de3-833a-a64027b3d3bc
8252024-10-09T22:52:02.911ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 57303, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57391 req_id = ed857cea-c514-4de3-833a-a64027b3d3bc
8262024-10-09T22:52:02.915ZERROtest_unauthorized (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8272024-10-09T22:52:02.926ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 203.961042ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8282024-10-09T22:52:02.942ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8292024-10-09T22:52:02.950ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
8302024-10-09T22:52:02.950ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8312024-10-09T22:52:02.951ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8322024-10-09T22:52:02.951ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8332024-10-09T22:52:02.951ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8342024-10-09T22:52:02.961ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8352024-10-09T22:52:02.962ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
8362024-10-09T22:52:02.962ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8372024-10-09T22:52:02.964ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
8382024-10-09T22:52:02.989ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8392024-10-09T22:52:03.030ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
8402024-10-09T22:52:03.030ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
8412024-10-09T22:52:03.030ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
8422024-10-09T22:52:03.031ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
8432024-10-09T22:52:03.032ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8442024-10-09T22:52:03.044ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8452024-10-09T22:52:03.048ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
8462024-10-09T22:52:03.065ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8472024-10-09T22:52:03.084ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
8482024-10-09T22:52:03.085ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8492024-10-09T22:52:03.093ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
8502024-10-09T22:52:03.094ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
8512024-10-09T22:52:03.094ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
8522024-10-09T22:52:03.096ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
8532024-10-09T22:52:03.153ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
8542024-10-09T22:52:03.153ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
8552024-10-09T22:52:03.154ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
8562024-10-09T22:52:03.275ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8572024-10-09T22:52:03.315ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
8582024-10-09T22:52:03.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
8592024-10-09T22:52:03.316ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8602024-10-09T22:52:03.316ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
8612024-10-09T22:52:03.316ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
8622024-10-09T22:52:03.317ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
8632024-10-09T22:52:03.318ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
8642024-10-09T22:52:03.323ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
8652024-10-09T22:52:03.325ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
8662024-10-09T22:52:03.325ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
8672024-10-09T22:52:03.325ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8682024-10-09T22:52:03.326ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
8692024-10-09T22:52:03.326ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8702024-10-09T22:52:03.334ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
8712024-10-09T22:52:03.336ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
8722024-10-09T22:52:03.336ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
8732024-10-09T22:52:03.337ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
8742024-10-09T22:52:03.342ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 594.801975ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
8752024-10-09T22:52:03.478ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8762024-10-09T22:52:03.487ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
8772024-10-09T22:52:03.488ZDEBGtest_unauthorized (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
8782024-10-09T22:52:03.488ZINFOtest_unauthorized (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
8792024-10-09T22:52:03.488ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 743.363856ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
8802024-10-09T22:52:03.490ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8812024-10-09T22:52:03.573ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
8822024-10-09T22:52:03.682ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
8832024-10-09T22:52:03.682ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
8842024-10-09T22:52:03.682ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
8852024-10-09T22:52:03.683ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
8862024-10-09T22:52:03.683ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
8872024-10-09T22:52:03.683ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
8882024-10-09T22:52:03.683ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
8892024-10-09T22:52:03.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
8902024-10-09T22:52:03.723ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8912024-10-09T22:52:03.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8922024-10-09T22:52:03.723ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8932024-10-09T22:52:03.723ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8942024-10-09T22:52:03.853ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 1.126981103s iteration = 1 status = {}
8952024-10-09T22:52:03.912ZINFOtest_unauthorized (SagaRecoverer): listed in-progress sagas count = 0
8962024-10-09T22:52:03.912ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 1.165890485s iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
8972024-10-09T22:52:03.912ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
8982024-10-09T22:52:03.912ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 1.217085008s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
8992024-10-09T22:52:03.912ZWARNtest_unauthorized (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
9002024-10-09T22:52:03.912ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 1.193614939s iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
9012024-10-09T22:52:03.913ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 1161095 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:63012 req_id = 4b59fafb-6ae5-4282-92d6-aae8206220b5 response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
9022024-10-09T22:52:03.913ZWARNtest_unauthorized (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
9032024-10-09T22:52:03.913ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 1.188723193s iteration = 1 status = {"error":"inventory collection is None"}
9042024-10-09T22:52:03.913ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
9052024-10-09T22:52:03.913ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
9062024-10-09T22:52:03.915ZWARNtest_unauthorized (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
9072024-10-09T22:52:03.915ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 1.216812411s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
9082024-10-09T22:52:03.918ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9092024-10-09T22:52:03.925ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9102024-10-09T22:52:03.925ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9112024-10-09T22:52:03.925ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9122024-10-09T22:52:03.926ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9132024-10-09T22:52:04.014ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9142024-10-09T22:52:04.014ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9152024-10-09T22:52:04.015ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9162024-10-09T22:52:04.033ZDEBGtest_unauthorized (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:58302/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "4b59fafb-6ae5-4282-92d6-aae8206220b5", "date": "Wed, 09 Oct 2024 22:52:03 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9172024-10-09T22:52:04.033ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 1.298743886s iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
9182024-10-09T22:52:04.033ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = region_replacement elapsed = 1.300296811s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
9192024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9202024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9212024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9222024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9232024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9242024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9252024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9262024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9272024-10-09T22:52:04.037ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51190 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9282024-10-09T22:52:04.037ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:51190 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9292024-10-09T22:52:04.038ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:51190 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9302024-10-09T22:52:04.038ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:51190 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9312024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9322024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9332024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9342024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9352024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9362024-10-09T22:52:04.039ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9372024-10-09T22:52:04.040ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9382024-10-09T22:52:04.040ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9392024-10-09T22:52:04.040ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42616 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9402024-10-09T22:52:04.040ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:42616 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9412024-10-09T22:52:04.040ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:42616 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9422024-10-09T22:52:04.040ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:42616 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9432024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9442024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9452024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9462024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9472024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9482024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9492024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9502024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9512024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63406 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9522024-10-09T22:52:04.062ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:63406 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9532024-10-09T22:52:04.062ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:63406 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9542024-10-09T22:52:04.062ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:63406 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9552024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9562024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9572024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9582024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9592024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9602024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9612024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9622024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9632024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34347 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9642024-10-09T22:52:04.063ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:34347 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9652024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:34347 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9662024-10-09T22:52:04.063ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:34347 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9672024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9682024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9692024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9702024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9712024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9722024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9732024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9742024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9752024-10-09T22:52:04.063ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:51370 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9762024-10-09T22:52:04.063ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:51370 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9772024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:51370 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9782024-10-09T22:52:04.064ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:51370 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9792024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9802024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9812024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9822024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9832024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9842024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9852024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9862024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9872024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40947 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9882024-10-09T22:52:04.064ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:40947 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9892024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:40947 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9902024-10-09T22:52:04.064ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:40947 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9912024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9922024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9932024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9942024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9952024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9962024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9972024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9982024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9992024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:35429 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10002024-10-09T22:52:04.064ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:35429 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10012024-10-09T22:52:04.064ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:35429 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10022024-10-09T22:52:04.065ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:35429 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10032024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10042024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10052024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10062024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10072024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10082024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10092024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10102024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10112024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:63288 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10122024-10-09T22:52:04.065ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:63288 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10132024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:63288 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10142024-10-09T22:52:04.065ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:63288 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10152024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10162024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10172024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10182024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10192024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10202024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10212024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10222024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10232024-10-09T22:52:04.065ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49360 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10242024-10-09T22:52:04.065ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:49360 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10252024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:49360 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10262024-10-09T22:52:04.066ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:49360 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10272024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10282024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10292024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10302024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10312024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10322024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10332024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10342024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10352024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:36608 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10362024-10-09T22:52:04.066ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:36608 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10372024-10-09T22:52:04.066ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:36608 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10382024-10-09T22:52:04.066ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:36608 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10392024-10-09T22:52:04.066ZDEBGtest_unauthorized (init_with_steps): Running step start_sled2
10402024-10-09T22:52:04.066ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10412024-10-09T22:52:04.259ZINFOtest_unauthorized (SledAgent): created simulated sled agent server = 039be560-54cc-49e3-88df-1a29dadbf913 sim_mode = Explicit sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10422024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10432024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10442024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10452024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /bootstore/status sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10462024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /cockroachdb sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10472024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /datasets sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10482024-10-09T22:52:04.263ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /datasets sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10492024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /disks/{disk_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10502024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /disks/{disk_id}/poke sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10512024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /eip-gateways sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10522024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /inventory sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10532024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /network-bootstore-config sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10542024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /network-bootstore-config sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10552024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /omicron-physical-disks sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10562024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /omicron-physical-disks sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10572024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /omicron-zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10582024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /omicron-zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10592024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /sled-identifiers sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10602024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /sled-role sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10612024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /sleds sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10622024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /switch-ports sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10632024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /timesync sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10642024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /update sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10652024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = DELETE path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10662024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10672024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /v2p sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10682024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = DELETE path = /vmms/{propolis_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10692024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /vmms/{propolis_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10702024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10712024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10722024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10732024-10-09T22:52:04.264ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /vmms/{propolis_id}/poke sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10742024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10752024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10762024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /vmms/{propolis_id}/state sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10772024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /vmms/{propolis_id}/state sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10782024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10792024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /vpc-routes sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10802024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /vpc-routes sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10812024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10822024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /zones/bundle-cleanup sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10832024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones/bundle-cleanup/context sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10842024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = PUT path = /zones/bundle-cleanup/context sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10852024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones/bundle-cleanup/utilization sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10862024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones/bundles sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10872024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones/bundles/{zone_name} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10882024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = POST path = /zones/bundles/{zone_name} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10892024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10902024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10912024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:50881 method = GET path = /zpools sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10922024-10-09T22:52:04.265ZINFOtest_unauthorized (dropshot): listening local_addr = [::1]:50881 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10932024-10-09T22:52:04.265ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:50881 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10942024-10-09T22:52:04.282ZDEBGtest_unauthorized (omicron_sled_agent::sim::Server): contacting server nexus sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
10952024-10-09T22:52:04.282ZDEBGtest_unauthorized (NexusClient): client request body = Some(Body) method = POST sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = http://127.0.0.1:58302/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
10962024-10-09T22:52:04.283ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 13 ba 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:57096 req_id = 539880e3-60d1-4048-967d-7c63ceb58d82
10972024-10-09T22:52:04.283ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 5050,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:57096 req_id = 539880e3-60d1-4048-967d-7c63ceb58d82
10982024-10-09T22:52:04.284ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 5050, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:57096 req_id = 539880e3-60d1-4048-967d-7c63ceb58d82
10992024-10-09T22:52:04.285ZINFOtest_unauthorized (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
11002024-10-09T22:52:04.285ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 1.549483342s iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
11012024-10-09T22:52:04.286ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:41644
11022024-10-09T22:52:04.286ZWARNtest_unauthorized (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
11032024-10-09T22:52:04.286ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.56397628s iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
11042024-10-09T22:52:04.286ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
11052024-10-09T22:52:04.286ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
11062024-10-09T22:52:04.287ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11072024-10-09T22:52:04.287ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
11082024-10-09T22:52:04.287ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
11092024-10-09T22:52:04.291ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
11102024-10-09T22:52:04.297ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:41644 req_id = a97827a1-4d5f-4cab-bbfa-a35038d30269 uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
11112024-10-09T22:52:04.301ZINFOtest_unauthorized (nexus): registered sled agent sled_uuid = 039be560-54cc-49e3-88df-1a29dadbf913
11122024-10-09T22:52:04.309ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11132024-10-09T22:52:04.326ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
11142024-10-09T22:52:04.326ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
11152024-10-09T22:52:04.326ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
11162024-10-09T22:52:04.328ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
11172024-10-09T22:52:04.736ZINFOtest_unauthorized (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
11182024-10-09T22:52:04.736ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:36561/vpc-routes
11192024-10-09T22:52:04.740ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
11202024-10-09T22:52:04.740ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11212024-10-09T22:52:04.740ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11222024-10-09T22:52:04.740ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11232024-10-09T22:52:04.741ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11242024-10-09T22:52:04.742ZTRACtest_unauthorized (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
11252024-10-09T22:52:04.742ZWARNtest_unauthorized (BackgroundTasks): instance reincarnation completed with errors background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0 query_errors = 0 restart_errors = 0
11262024-10-09T22:52:04.742ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 2.004160095s iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
11272024-10-09T22:52:04.754ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
11282024-10-09T22:52:04.798ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
11292024-10-09T22:52:04.801ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11302024-10-09T22:52:04.864ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11312024-10-09T22:52:04.871ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11322024-10-09T22:52:04.881ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11332024-10-09T22:52:04.896ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
11342024-10-09T22:52:04.904ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
11352024-10-09T22:52:04.914ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
11362024-10-09T22:52:04.916ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
11372024-10-09T22:52:04.930ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:64434 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11382024-10-09T22:52:04.941ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = GET remote_addr = [::1]:64434 req_id = eb3c1762-2e44-4c24-bca0-bb2e0d11228b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11392024-10-09T22:52:04.942ZINFOtest_unauthorized (dropshot): request completed latency_us = 1362 local_addr = [::1]:36561 method = GET remote_addr = [::1]:64434 req_id = eb3c1762-2e44-4c24-bca0-bb2e0d11228b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
11402024-10-09T22:52:04.958ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:36561/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "eb3c1762-2e44-4c24-bca0-bb2e0d11228b", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
11412024-10-09T22:52:04.958ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
11422024-10-09T22:52:04.958ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
11432024-10-09T22:52:04.960ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
11442024-10-09T22:52:04.960ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11452024-10-09T22:52:04.965ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
11462024-10-09T22:52:04.968ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
11472024-10-09T22:52:04.968ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11482024-10-09T22:52:04.968ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11492024-10-09T22:52:04.968ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11502024-10-09T22:52:04.973ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11512024-10-09T22:52:04.976ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
11522024-10-09T22:52:04.976ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11532024-10-09T22:52:04.976ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11542024-10-09T22:52:04.978ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11552024-10-09T22:52:04.979ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11562024-10-09T22:52:04.979ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11572024-10-09T22:52:04.981ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11582024-10-09T22:52:04.985ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
11592024-10-09T22:52:04.985ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11602024-10-09T22:52:04.991ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11612024-10-09T22:52:04.993ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11622024-10-09T22:52:04.994ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11632024-10-09T22:52:04.994ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11642024-10-09T22:52:04.994ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11652024-10-09T22:52:04.995ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11662024-10-09T22:52:04.996ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 699398 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:41644 req_id = a97827a1-4d5f-4cab-bbfa-a35038d30269 response_code = 204 uri = /sled-agents/039be560-54cc-49e3-88df-1a29dadbf913
11672024-10-09T22:52:04.998ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 97 db 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:56795 req_id = 5fcf7927-cff6-4747-9bb4-4b834b0bab11
11682024-10-09T22:52:04.998ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 38875,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56795 req_id = 5fcf7927-cff6-4747-9bb4-4b834b0bab11
11692024-10-09T22:52:04.998ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 38875, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56795 req_id = 5fcf7927-cff6-4747-9bb4-4b834b0bab11
11702024-10-09T22:52:04.998ZDEBGtest_unauthorized (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:58302/sled-agents/039be560-54cc-49e3-88df-1a29dadbf913", status: 204, headers: {"x-request-id": "a97827a1-4d5f-4cab-bbfa-a35038d30269", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} }) sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11712024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11722024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11732024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11742024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11752024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11762024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11772024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11782024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11792024-10-09T22:52:05.003ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55904 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11802024-10-09T22:52:05.003ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:55904 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11812024-10-09T22:52:05.004ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:55904 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11822024-10-09T22:52:05.004ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:55904 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11832024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11842024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11852024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11862024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11872024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11882024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11892024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11902024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11912024-10-09T22:52:05.005ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:50321 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11922024-10-09T22:52:05.005ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:50321 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11932024-10-09T22:52:05.006ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:50321 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11942024-10-09T22:52:05.006ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:50321 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11952024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11962024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11972024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11982024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
11992024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12002024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12012024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12022024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12032024-10-09T22:52:05.007ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:49351 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12042024-10-09T22:52:05.007ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:49351 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12052024-10-09T22:52:05.008ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:49351 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12062024-10-09T22:52:05.008ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:49351 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12072024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12082024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12092024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12102024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12112024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12122024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12132024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12142024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12152024-10-09T22:52:05.010ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42463 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12162024-10-09T22:52:05.010ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:42463 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12172024-10-09T22:52:05.011ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:42463 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12182024-10-09T22:52:05.011ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:42463 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12192024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12202024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12212024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12222024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12232024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12242024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12252024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12262024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12272024-10-09T22:52:05.013ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34603 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12282024-10-09T22:52:05.013ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:34603 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12292024-10-09T22:52:05.014ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:34603 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12302024-10-09T22:52:05.014ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:34603 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12312024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12322024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12332024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12342024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12352024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12362024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12372024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12382024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12392024-10-09T22:52:05.015ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:55534 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12402024-10-09T22:52:05.015ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:55534 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12412024-10-09T22:52:05.016ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:55534 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12422024-10-09T22:52:05.016ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:55534 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12432024-10-09T22:52:05.017ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12442024-10-09T22:52:05.017ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12452024-10-09T22:52:05.017ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12462024-10-09T22:52:05.017ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12472024-10-09T22:52:05.017ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12482024-10-09T22:52:05.018ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12492024-10-09T22:52:05.018ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12502024-10-09T22:52:05.018ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12512024-10-09T22:52:05.018ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:53606 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12522024-10-09T22:52:05.018ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:53606 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12532024-10-09T22:52:05.019ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:53606 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12542024-10-09T22:52:05.019ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:53606 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12552024-10-09T22:52:05.041ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12562024-10-09T22:52:05.041ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12572024-10-09T22:52:05.041ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12582024-10-09T22:52:05.041ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12592024-10-09T22:52:05.042ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12602024-10-09T22:52:05.042ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12612024-10-09T22:52:05.042ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12622024-10-09T22:52:05.042ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12632024-10-09T22:52:05.042ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:33691 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12642024-10-09T22:52:05.042ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:33691 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12652024-10-09T22:52:05.044ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:33691 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12662024-10-09T22:52:05.044ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:33691 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12672024-10-09T22:52:05.045ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12682024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12692024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12702024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12712024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12722024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12732024-10-09T22:52:05.046ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12742024-10-09T22:52:05.047ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12752024-10-09T22:52:05.047ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:42937 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12762024-10-09T22:52:05.047ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:42937 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12772024-10-09T22:52:05.051ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:42937 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12782024-10-09T22:52:05.051ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:42937 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12792024-10-09T22:52:05.052ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = GET path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12802024-10-09T22:52:05.053ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = POST path = /crucible/0/regions server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12812024-10-09T22:52:05.053ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = DELETE path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12822024-10-09T22:52:05.053ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = GET path = /crucible/0/regions/{id} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12832024-10-09T22:52:05.053ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = GET path = /crucible/0/regions/{id}/snapshots server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12842024-10-09T22:52:05.054ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12852024-10-09T22:52:05.054ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12862024-10-09T22:52:05.054ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12872024-10-09T22:52:05.054ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:34912 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12882024-10-09T22:52:05.054ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:34912 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12892024-10-09T22:52:05.055ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:34912 server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12902024-10-09T22:52:05.055ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:34912 kind = storage server = 039be560-54cc-49e3-88df-1a29dadbf913 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
12912024-10-09T22:52:05.055ZDEBGtest_unauthorized (init_with_steps): Running step start_crucible_pantry
12922024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12932024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12942024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12952024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12962024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12972024-10-09T22:52:05.057ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12982024-10-09T22:52:05.058ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12992024-10-09T22:52:05.058ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13002024-10-09T22:52:05.058ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13012024-10-09T22:52:05.058ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13022024-10-09T22:52:05.058ZDEBGtest_unauthorized (dropshot): registered endpoint kind = pantry local_addr = [::1]:48253 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13032024-10-09T22:52:05.058ZINFOtest_unauthorized (dropshot): listening kind = pantry local_addr = [::1]:48253 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13042024-10-09T22:52:05.059ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:48253 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13052024-10-09T22:52:05.059ZINFOtest_unauthorized (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:48253 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13062024-10-09T22:52:05.059ZDEBGtest_unauthorized (init_with_steps): Running step populate_internal_dns
13072024-10-09T22:52:05.060ZDEBGtest_unauthorized: Populating Internal DNS
13082024-10-09T22:52:05.149ZINFOtest_unauthorized: DNS population: DnsConfigParams { generation: 1, time_created: 2024-10-09T22:52:05.149114595Z, zones: [ DnsConfigZone { records: { "aa83d74e-a254-46a4-a626-c6ab484c660c.host": [ Aaaa( ::1, ), ], "_clickhouse._tcp": [ Srv( Srv { port: 58379, prio: 0, target: "70e5acd2-5566-4f7d-ad61-1e0ff0b48222.host.control-plane.oxide.internal", weight: 0, }, ), ], "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host": [ Aaaa( ::1, ), ], "_cockroach._tcp": [ Srv( Srv { port: 64376, prio: 0, target: "b1c3a425-b923-4ede-bc2c-f6881db9a26f.host.control-plane.oxide.internal", weight: 0, }, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "b1c3a425-b923-4ede-bc2c-f6881db9a26f.host": [ Aaaa( ::1, ), ], "_nexus._tcp": [ Srv( Srv { port: 58302, prio: 0, target: "3173ad92-59fe-4065-97ff-35fc539b0d16.host.control-plane.oxide.internal", weight: 0, }, ), ], "b496437c-d2e0-459c-b367-2ee4cddba0eb.host": [ Aaaa( ::1, ), ], "d065e7c0-c8d3-452f-a7c9-20960d250b6f.host": [ Aaaa( ::1, ), ], "_nameservice._tcp": [ Srv( Srv { port: 40130, prio: 0, target: "d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal", weight: 0, }, ), ], "_clickhouse-native._tcp": [ Srv( Srv { port: 9000, prio: 0, target: "70e5acd2-5566-4f7d-ad61-1e0ff0b48222.host.control-plane.oxide.internal", weight: 0, }, ), ], "70e5acd2-5566-4f7d-ad61-1e0ff0b48222.host": [ Aaaa( ::1, ), ], "_external-dns._tcp": [ Srv( Srv { port: 46067, prio: 0, target: "aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal", weight: 0, }, ), ], "_mgs._tcp": [ Srv( Srv { port: 49138, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 39308, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "_dendrite._tcp": [ Srv( Srv { port: 45802, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 65072, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "_mgd._tcp": [ Srv( Srv { port: 58887, prio: 0, target: "dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal", weight: 0, }, ), Srv( Srv { port: 59451, prio: 0, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", weight: 0, }, ), ], "3173ad92-59fe-4065-97ff-35fc539b0d16.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "_crucible-pantry._tcp": [ Srv( Srv { port: 48253, prio: 0, target: "b496437c-d2e0-459c-b367-2ee4cddba0eb.host.control-plane.oxide.internal", weight: 0, }, ), ], }, zone_name: "control-plane.oxide.internal", }, ], }
13092024-10-09T22:52:05.150ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:40130/config
13102024-10-09T22:52:05.152ZWARNtest_unauthorized (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
13112024-10-09T22:52:05.152ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 865.784006ms iteration = 2 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
13122024-10-09T22:52:05.152ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
13132024-10-09T22:52:05.152ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
13142024-10-09T22:52:05.152ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13152024-10-09T22:52:05.152ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
13162024-10-09T22:52:05.152ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
13172024-10-09T22:52:05.153ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
13182024-10-09T22:52:05.155ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13192024-10-09T22:52:05.164ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
13202024-10-09T22:52:05.164ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
13212024-10-09T22:52:05.164ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
13222024-10-09T22:52:05.164ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13232024-10-09T22:52:05.164ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13242024-10-09T22:52:05.164ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13252024-10-09T22:52:05.164ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13262024-10-09T22:52:05.393ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913 background_task = v2p_manager body = None method = GET uri = http://[::1]:50881/v2p
13272024-10-09T22:52:05.395ZWARNtest_unauthorized (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
13282024-10-09T22:52:05.395ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 2.693641436s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
13292024-10-09T22:52:05.395ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13302024-10-09T22:52:05.404ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
13312024-10-09T22:52:05.404ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
13322024-10-09T22:52:05.404ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
13332024-10-09T22:52:05.405ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
13342024-10-09T22:52:05.408ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13352024-10-09T22:52:05.409ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13362024-10-09T22:52:05.409ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13372024-10-09T22:52:05.410ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13382024-10-09T22:52:05.413ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
13392024-10-09T22:52:05.413ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
13402024-10-09T22:52:05.416ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:40130 remote_addr = [::1]:34551
13412024-10-09T22:52:05.416ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:50881 remote_addr = [::1]:61560 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
13422024-10-09T22:52:05.451ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13432024-10-09T22:52:05.452ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13442024-10-09T22:52:05.452ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13452024-10-09T22:52:05.452ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13462024-10-09T22:52:05.456ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:50881 method = GET remote_addr = [::1]:61560 req_id = 3080b806-df6b-4824-bc08-d3e6f2e6007a sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /v2p
13472024-10-09T22:52:05.460ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: d6 a2 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:58553 req_id = d65598c5-fc78-4323-b063-ca05b6cf8aa1
13482024-10-09T22:52:05.460ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 54946,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:58553 req_id = d65598c5-fc78-4323-b063-ca05b6cf8aa1
13492024-10-09T22:52:05.464ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 54946, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:58553 req_id = d65598c5-fc78-4323-b063-ca05b6cf8aa1
13502024-10-09T22:52:05.469ZINFOtest_unauthorized (dropshot): request completed latency_us = 12259 local_addr = [::1]:50881 method = GET remote_addr = [::1]:61560 req_id = 3080b806-df6b-4824-bc08-d3e6f2e6007a response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /v2p
13512024-10-09T22:52:05.470ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13522024-10-09T22:52:05.502ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
13532024-10-09T22:52:05.503ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13542024-10-09T22:52:05.503ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13552024-10-09T22:52:05.503ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13562024-10-09T22:52:05.505ZINFOtest_unauthorized (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
13572024-10-09T22:52:05.506ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:36561/eip-gateways
13582024-10-09T22:52:05.507ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = PUT remote_addr = [::1]:64434 req_id = 5cf81bdd-01cf-49b1-ac74-411bc0bf0469 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
13592024-10-09T22:52:05.510ZWARNtest_unauthorized (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
13602024-10-09T22:52:05.510ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 357.957255ms iteration = 3 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
13612024-10-09T22:52:05.511ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:40130 method = PUT remote_addr = [::1]:34551 req_id = ce7c5907-0d3b-4128-9cf2-975c9a914a29 uri = /config
13622024-10-09T22:52:05.513ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = 039be560-54cc-49e3-88df-1a29dadbf913 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:50881/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "3080b806-df6b-4824-bc08-d3e6f2e6007a", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
13632024-10-09T22:52:05.514ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-039be560
13642024-10-09T22:52:05.514ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-039be560
13652024-10-09T22:52:05.514ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-039be560
13662024-10-09T22:52:05.515ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:36561/v2p
13672024-10-09T22:52:05.516ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = ce7c5907-0d3b-4128-9cf2-975c9a914a29
13682024-10-09T22:52:05.516ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
13692024-10-09T22:52:05.516ZDEBGtest_unauthorized (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
13702024-10-09T22:52:05.525ZDEBGtest_unauthorized (store): updating current config
13712024-10-09T22:52:05.528ZDEBGtest_unauthorized (store): flushing default tree
13722024-10-09T22:52:05.535ZINFOtest_unauthorized (store): pruning trees for generations older than 1 keep = 3
13732024-10-09T22:52:05.535ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = ce7c5907-0d3b-4128-9cf2-975c9a914a29
13742024-10-09T22:52:05.546ZINFOtest_unauthorized (dropshot): request completed latency_us = 39268 local_addr = [::1]:36561 method = PUT remote_addr = [::1]:64434 req_id = 5cf81bdd-01cf-49b1-ac74-411bc0bf0469 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
13752024-10-09T22:52:05.547ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 36126 local_addr = [::1]:40130 method = PUT remote_addr = [::1]:34551 req_id = ce7c5907-0d3b-4128-9cf2-975c9a914a29 response_code = 204 uri = /config
13762024-10-09T22:52:05.547ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13772024-10-09T22:52:05.547ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13782024-10-09T22:52:05.549ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13792024-10-09T22:52:05.552ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:39802 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13802024-10-09T22:52:05.554ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:36561/eip-gateways", status: 204, headers: {"x-request-id": "5cf81bdd-01cf-49b1-ac74-411bc0bf0469", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
13812024-10-09T22:52:05.556ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 2.815701543s iteration = 1 status = {}
13822024-10-09T22:52:05.557ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:40130/config", status: 204, headers: {"x-request-id": "ce7c5907-0d3b-4128-9cf2-975c9a914a29", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
13832024-10-09T22:52:05.562ZDEBGtest_unauthorized (init_with_steps): Running step configure_sled_agent1
13842024-10-09T22:52:05.669ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:36561/omicron-zones
13852024-10-09T22:52:05.672ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = GET remote_addr = [::1]:39802 req_id = 10298fe0-29be-4b30-901c-61301e0c1e9d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13862024-10-09T22:52:05.682ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13872024-10-09T22:52:05.682ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13882024-10-09T22:52:05.683ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13892024-10-09T22:52:05.683ZINFOtest_unauthorized (dropshot): request completed latency_us = 11688 local_addr = [::1]:36561 method = GET remote_addr = [::1]:39802 req_id = 10298fe0-29be-4b30-901c-61301e0c1e9d response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13902024-10-09T22:52:05.708ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:43181 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13912024-10-09T22:52:05.713ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:36561/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "10298fe0-29be-4b30-901c-61301e0c1e9d", "content-length": "2", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
13922024-10-09T22:52:05.713ZINFOtest_unauthorized (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
13932024-10-09T22:52:05.713ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
13942024-10-09T22:52:05.713ZINFOtest_unauthorized (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
13952024-10-09T22:52:05.715ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 2.987278794s iteration = 1 status = {}
13962024-10-09T22:52:05.728ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13972024-10-09T22:52:05.728ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13982024-10-09T22:52:05.732ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13992024-10-09T22:52:05.735ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = PUT remote_addr = [::1]:43181 req_id = ddc04281-9c18-47a1-9259-059f1e498261 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
14002024-10-09T22:52:05.746ZINFOtest_unauthorized (dropshot): request completed latency_us = 11033 local_addr = [::1]:36561 method = PUT remote_addr = [::1]:43181 req_id = ddc04281-9c18-47a1-9259-059f1e498261 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
14012024-10-09T22:52:05.749ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
14022024-10-09T22:52:05.749ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14032024-10-09T22:52:05.749ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14042024-10-09T22:52:05.750ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14052024-10-09T22:52:05.750ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14062024-10-09T22:52:05.751ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:36561/omicron-zones", status: 204, headers: {"x-request-id": "ddc04281-9c18-47a1-9259-059f1e498261", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
14072024-10-09T22:52:05.751ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:36561/network-bootstore-config
14082024-10-09T22:52:05.755ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = PUT remote_addr = [::1]:43181 req_id = 88da052a-9332-4466-b131-68692d1779b1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14092024-10-09T22:52:05.758ZINFOtest_unauthorized (dropshot): request completed latency_us = 3165 local_addr = [::1]:36561 method = PUT remote_addr = [::1]:43181 req_id = 88da052a-9332-4466-b131-68692d1779b1 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14102024-10-09T22:52:05.758ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14112024-10-09T22:52:05.758ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14122024-10-09T22:52:05.758ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14132024-10-09T22:52:05.759ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14142024-10-09T22:52:05.769ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:36561/network-bootstore-config", status: 204, headers: {"x-request-id": "88da052a-9332-4466-b131-68692d1779b1", "date": "Wed, 09 Oct 2024 22:52:04 GMT"} })
14152024-10-09T22:52:05.771ZDEBGtest_unauthorized (init_with_steps): Running step configure_sled_agent2
14162024-10-09T22:52:05.892ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:50881/omicron-zones
14172024-10-09T22:52:05.902ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14182024-10-09T22:52:05.902ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14192024-10-09T22:52:05.902ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14202024-10-09T22:52:05.903ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14212024-10-09T22:52:05.904ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:50881 remote_addr = [::1]:50102 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
14222024-10-09T22:52:05.928ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14232024-10-09T22:52:05.946ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
14242024-10-09T22:52:05.946ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
14252024-10-09T22:52:05.950ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14262024-10-09T22:52:05.950ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14272024-10-09T22:52:05.951ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14282024-10-09T22:52:05.958ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:50881 method = PUT remote_addr = [::1]:50102 req_id = 6c9a7b0e-140b-463f-a112-abf7203e9e1b sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
14292024-10-09T22:52:05.960ZINFOtest_unauthorized (dropshot): request completed latency_us = 1617 local_addr = [::1]:50881 method = PUT remote_addr = [::1]:50102 req_id = 6c9a7b0e-140b-463f-a112-abf7203e9e1b response_code = 204 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
14302024-10-09T22:52:05.964ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14312024-10-09T22:52:05.965ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14322024-10-09T22:52:05.967ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14332024-10-09T22:52:05.969ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:50881/omicron-zones", status: 204, headers: {"x-request-id": "6c9a7b0e-140b-463f-a112-abf7203e9e1b", "date": "Wed, 09 Oct 2024 22:52:05 GMT"} })
14342024-10-09T22:52:05.969ZDEBGtest_unauthorized: client request body = Some(Body) method = PUT uri = http://[::1]:50881/network-bootstore-config
14352024-10-09T22:52:05.971ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:50881 method = PUT remote_addr = [::1]:50102 req_id = 66247ba7-bbba-4f10-a2ee-5db7d0a99f75 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /network-bootstore-config
14362024-10-09T22:52:05.986ZINFOtest_unauthorized (dropshot): request completed latency_us = 15402 local_addr = [::1]:50881 method = PUT remote_addr = [::1]:50102 req_id = 66247ba7-bbba-4f10-a2ee-5db7d0a99f75 response_code = 204 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /network-bootstore-config
14372024-10-09T22:52:05.986ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14382024-10-09T22:52:05.987ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14392024-10-09T22:52:05.988ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14402024-10-09T22:52:05.991ZDEBGtest_unauthorized: client response result = Ok(Response { url: "http://[::1]:50881/network-bootstore-config", status: 204, headers: {"x-request-id": "66247ba7-bbba-4f10-a2ee-5db7d0a99f75", "date": "Wed, 09 Oct 2024 22:52:05 GMT"} })
14412024-10-09T22:52:05.994ZDEBGtest_unauthorized (init_with_steps): Running step start_nexus_external
14422024-10-09T22:52:05.994ZDEBGtest_unauthorized: Starting Nexus (external API)
14432024-10-09T22:52:07.829ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
14442024-10-09T22:52:07.829ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14452024-10-09T22:52:07.829ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14462024-10-09T22:52:07.829ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14472024-10-09T22:52:07.830ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14482024-10-09T22:52:07.865ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14492024-10-09T22:52:07.865ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14502024-10-09T22:52:07.866ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14512024-10-09T22:52:07.871ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
14522024-10-09T22:52:07.871ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14532024-10-09T22:52:07.871ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14542024-10-09T22:52:07.871ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14552024-10-09T22:52:07.872ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14562024-10-09T22:52:07.873ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14572024-10-09T22:52:07.875ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
14582024-10-09T22:52:07.885ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14592024-10-09T22:52:07.885ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14602024-10-09T22:52:07.886ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14612024-10-09T22:52:07.967ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14622024-10-09T22:52:07.967ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14632024-10-09T22:52:07.968ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14642024-10-09T22:52:07.973ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14652024-10-09T22:52:07.979ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14662024-10-09T22:52:07.980ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14672024-10-09T22:52:07.980ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14682024-10-09T22:52:07.987ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14692024-10-09T22:52:07.987ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14702024-10-09T22:52:07.987ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14712024-10-09T22:52:07.989ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14722024-10-09T22:52:08.001ZINFOtest_unauthorized (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
14732024-10-09T22:52:08.001ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14742024-10-09T22:52:08.001ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14752024-10-09T22:52:08.010ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14762024-10-09T22:52:08.059ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14772024-10-09T22:52:08.071ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
14782024-10-09T22:52:08.090ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
14792024-10-09T22:52:08.100ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
14802024-10-09T22:52:08.101ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14812024-10-09T22:52:08.101ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14822024-10-09T22:52:08.101ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14832024-10-09T22:52:08.102ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14842024-10-09T22:52:08.159ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
14852024-10-09T22:52:08.159ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14862024-10-09T22:52:08.159ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14872024-10-09T22:52:08.159ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14882024-10-09T22:52:08.160ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14892024-10-09T22:52:08.174ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14902024-10-09T22:52:08.186ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
14912024-10-09T22:52:08.186ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14922024-10-09T22:52:08.188ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14932024-10-09T22:52:08.209ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14942024-10-09T22:52:08.294ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
14952024-10-09T22:52:08.304ZDEBGtest_unauthorized (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
14962024-10-09T22:52:08.305ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14972024-10-09T22:52:08.305ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
14982024-10-09T22:52:08.307ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14992024-10-09T22:52:08.312ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15002024-10-09T22:52:08.312ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15012024-10-09T22:52:08.312ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15022024-10-09T22:52:08.314ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15032024-10-09T22:52:08.322ZINFOtest_unauthorized (InternalApi): Using static configuration for external switchports
15042024-10-09T22:52:08.322ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15052024-10-09T22:52:08.322ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15062024-10-09T22:52:08.323ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15072024-10-09T22:52:08.323ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15082024-10-09T22:52:08.346ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
15092024-10-09T22:52:08.346ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15102024-10-09T22:52:08.346ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15112024-10-09T22:52:08.347ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15122024-10-09T22:52:08.552ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15132024-10-09T22:52:08.552ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15142024-10-09T22:52:08.553ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15152024-10-09T22:52:08.612ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15162024-10-09T22:52:08.612ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15172024-10-09T22:52:08.615ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15182024-10-09T22:52:08.626ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15192024-10-09T22:52:08.626ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15202024-10-09T22:52:08.629ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15212024-10-09T22:52:08.630ZINFOtest_unauthorized (InternalApi): Recording Rack Network Configuration
15222024-10-09T22:52:08.630ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15232024-10-09T22:52:08.631ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15242024-10-09T22:52:08.634ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15252024-10-09T22:52:08.669ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15262024-10-09T22:52:08.669ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15272024-10-09T22:52:08.671ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15282024-10-09T22:52:08.680ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
15292024-10-09T22:52:08.681ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15302024-10-09T22:52:08.681ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15312024-10-09T22:52:08.681ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15322024-10-09T22:52:08.683ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15332024-10-09T22:52:08.723ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15342024-10-09T22:52:08.723ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15352024-10-09T22:52:08.723ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15362024-10-09T22:52:08.724ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15372024-10-09T22:52:08.786ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15382024-10-09T22:52:08.786ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15392024-10-09T22:52:08.786ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15402024-10-09T22:52:08.787ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15412024-10-09T22:52:08.809ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15422024-10-09T22:52:08.839ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
15432024-10-09T22:52:08.839ZTRACtest_unauthorized (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
15442024-10-09T22:52:08.839ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
15452024-10-09T22:52:08.839ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
15462024-10-09T22:52:08.839ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15472024-10-09T22:52:08.839ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15482024-10-09T22:52:08.840ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15492024-10-09T22:52:08.856ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
15502024-10-09T22:52:08.856ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15512024-10-09T22:52:08.856ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15522024-10-09T22:52:08.858ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15532024-10-09T22:52:08.860ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15542024-10-09T22:52:08.860ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15552024-10-09T22:52:08.860ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15562024-10-09T22:52:08.861ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15572024-10-09T22:52:08.873ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15582024-10-09T22:52:08.885ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
15592024-10-09T22:52:08.886ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15602024-10-09T22:52:08.886ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15612024-10-09T22:52:08.886ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15622024-10-09T22:52:08.894ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15632024-10-09T22:52:08.895ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15642024-10-09T22:52:08.895ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15652024-10-09T22:52:08.895ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15662024-10-09T22:52:08.899ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15672024-10-09T22:52:08.924ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15682024-10-09T22:52:08.929ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15692024-10-09T22:52:08.929ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15702024-10-09T22:52:08.929ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15712024-10-09T22:52:08.929ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15722024-10-09T22:52:08.938ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
15732024-10-09T22:52:08.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet
15742024-10-09T22:52:08.939ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15752024-10-09T22:52:08.939ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15762024-10-09T22:52:08.939ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15772024-10-09T22:52:08.940ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15782024-10-09T22:52:08.948ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") }
15792024-10-09T22:52:08.948ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15802024-10-09T22:52:08.948ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15812024-10-09T22:52:08.948ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15822024-10-09T22:52:08.949ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15832024-10-09T22:52:08.951ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15842024-10-09T22:52:08.958ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
15852024-10-09T22:52:08.958ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
15862024-10-09T22:52:08.958ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15872024-10-09T22:52:08.958ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15882024-10-09T22:52:08.965ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15892024-10-09T22:52:08.984ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15902024-10-09T22:52:08.984ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15912024-10-09T22:52:08.984ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
15922024-10-09T22:52:08.985ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15932024-10-09T22:52:08.986ZTRACtest_unauthorized (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:24:05.243015Z, allowed_ips: None } background_task = service_firewall_rule_propagation
15942024-10-09T22:52:08.986ZDEBGtest_unauthorized (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
15952024-10-09T22:52:08.986ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
15962024-10-09T22:52:08.986ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
15972024-10-09T22:52:09.018ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") }
15982024-10-09T22:52:09.018ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15992024-10-09T22:52:09.018ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16002024-10-09T22:52:09.018ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16012024-10-09T22:52:09.019ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16022024-10-09T22:52:09.039ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16032024-10-09T22:52:09.045ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") } result = Ok(())
16042024-10-09T22:52:09.113ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") }
16052024-10-09T22:52:09.114ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16062024-10-09T22:52:09.114ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16072024-10-09T22:52:09.114ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16082024-10-09T22:52:09.115ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16092024-10-09T22:52:09.146ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16102024-10-09T22:52:09.166ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: e3195b3c-9fce-4e8a-9ed4-1881643fcc04, lookup_type: ByName("oxide-service-pool") } result = Ok(())
16112024-10-09T22:52:09.176ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
16122024-10-09T22:52:09.177ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16132024-10-09T22:52:09.177ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16142024-10-09T22:52:09.177ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16152024-10-09T22:52:09.178ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16162024-10-09T22:52:09.208ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16172024-10-09T22:52:09.213ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
16182024-10-09T22:52:09.219ZDEBGtest_unauthorized (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
16192024-10-09T22:52:09.219ZDEBGtest_unauthorized (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
16202024-10-09T22:52:09.220ZINFOtest_unauthorized (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
16212024-10-09T22:52:09.220ZDEBGtest_unauthorized (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 6.480417904s
16222024-10-09T22:52:09.220ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 6.480751717s iteration = 1 status = {}
16232024-10-09T22:52:09.624ZINFOtest_unauthorized (InternalApi): inserted blueprint blueprint_id = d72b61d5-b612-4072-8165-a10aae0e04ef
16242024-10-09T22:52:09.624ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
16252024-10-09T22:52:09.624ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16262024-10-09T22:52:09.624ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16272024-10-09T22:52:09.624ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16282024-10-09T22:52:09.626ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16292024-10-09T22:52:09.652ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16302024-10-09T22:52:09.673ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
16312024-10-09T22:52:09.709ZINFOtest_unauthorized (InternalApi): No networking records needed for cockroach_db service
16322024-10-09T22:52:09.709ZINFOtest_unauthorized (InternalApi): No networking records needed for clickhouse service
16332024-10-09T22:52:09.710ZINFOtest_unauthorized (InternalApi): No networking records needed for internal_dns service
16342024-10-09T22:52:09.784ZINFOtest_unauthorized (InternalApi): Inserted networking records for external_dns service
16352024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): Inserted networking records for nexus service
16362024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): No networking records needed for crucible_pantry service
16372024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): Inserted service networking records
16382024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): Inserted physical disks
16392024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): Inserted zpools
16402024-10-09T22:52:09.825ZINFOtest_unauthorized (InternalApi): Inserted datasets
16412024-10-09T22:52:09.848ZINFOtest_unauthorized (InternalApi): Populated DNS tables for internal DNS
16422024-10-09T22:52:09.887ZINFOtest_unauthorized (InternalApi): Populated DNS tables for external DNS
16432024-10-09T22:52:09.887ZTRACtest_unauthorized (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16442024-10-09T22:52:09.887ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16452024-10-09T22:52:09.887ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16462024-10-09T22:52:09.887ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16472024-10-09T22:52:09.888ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16482024-10-09T22:52:09.891ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16492024-10-09T22:52:09.895ZDEBGtest_unauthorized (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16502024-10-09T22:52:09.895ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16512024-10-09T22:52:09.896ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16522024-10-09T22:52:09.896ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16532024-10-09T22:52:09.896ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16542024-10-09T22:52:09.898ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16552024-10-09T22:52:09.912ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16562024-10-09T22:52:09.916ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16572024-10-09T22:52:10.032ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16582024-10-09T22:52:10.032ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16592024-10-09T22:52:10.032ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16602024-10-09T22:52:10.032ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16612024-10-09T22:52:10.033ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16622024-10-09T22:52:10.037ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16632024-10-09T22:52:10.052ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16642024-10-09T22:52:10.052ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16652024-10-09T22:52:10.052ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16662024-10-09T22:52:10.052ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16672024-10-09T22:52:10.053ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16682024-10-09T22:52:10.053ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16692024-10-09T22:52:10.074ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16702024-10-09T22:52:10.083ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16712024-10-09T22:52:10.087ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
16722024-10-09T22:52:10.087ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16732024-10-09T22:52:10.087ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16742024-10-09T22:52:10.087ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16752024-10-09T22:52:10.088ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16762024-10-09T22:52:10.099ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16772024-10-09T22:52:10.109ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
16782024-10-09T22:52:10.146ZINFOtest_unauthorized (InternalApi): Created recovery silo
16792024-10-09T22:52:10.151ZINFOtest_unauthorized (InternalApi): Created recovery user
16802024-10-09T22:52:10.176ZINFOtest_unauthorized (InternalApi): Created recovery user's password
16812024-10-09T22:52:10.176ZTRACtest_unauthorized (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, lookup_type: ById(91d6eb6c-962a-46ba-aaee-3f0e76ce2fef) }
16822024-10-09T22:52:10.176ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef resource_type = Silo
16832024-10-09T22:52:10.176ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16842024-10-09T22:52:10.177ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16852024-10-09T22:52:10.177ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16862024-10-09T22:52:10.194ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16872024-10-09T22:52:10.194ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16882024-10-09T22:52:10.194ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16892024-10-09T22:52:10.195ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16902024-10-09T22:52:10.206ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16912024-10-09T22:52:10.209ZDEBGtest_unauthorized (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, lookup_type: ById(91d6eb6c-962a-46ba-aaee-3f0e76ce2fef) } result = Ok(())
16922024-10-09T22:52:10.209ZDEBGtest_unauthorized (InternalApi): Generated role assignment queries
16932024-10-09T22:52:10.215ZINFOtest_unauthorized (InternalApi): Granted Silo privileges
16942024-10-09T22:52:10.215ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16952024-10-09T22:52:10.216ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16962024-10-09T22:52:10.216ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16972024-10-09T22:52:10.216ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
16982024-10-09T22:52:10.216ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16992024-10-09T22:52:10.224ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17002024-10-09T22:52:10.227ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
17012024-10-09T22:52:10.288ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17022024-10-09T22:52:10.288ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17032024-10-09T22:52:10.289ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17042024-10-09T22:52:10.295ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17052024-10-09T22:52:10.295ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17062024-10-09T22:52:10.295ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17072024-10-09T22:52:10.299ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17082024-10-09T22:52:10.300ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17092024-10-09T22:52:10.300ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17102024-10-09T22:52:10.303ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17112024-10-09T22:52:10.303ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17122024-10-09T22:52:10.303ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17132024-10-09T22:52:10.304ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17142024-10-09T22:52:10.304ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17152024-10-09T22:52:10.321ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17162024-10-09T22:52:10.322ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17172024-10-09T22:52:10.322ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17182024-10-09T22:52:10.323ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17192024-10-09T22:52:10.325ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17202024-10-09T22:52:10.325ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17212024-10-09T22:52:10.325ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17222024-10-09T22:52:10.327ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17232024-10-09T22:52:10.331ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17242024-10-09T22:52:10.344ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17252024-10-09T22:52:10.344ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
17262024-10-09T22:52:10.344ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17272024-10-09T22:52:10.344ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17282024-10-09T22:52:10.344ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17292024-10-09T22:52:10.344ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17302024-10-09T22:52:10.344ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17312024-10-09T22:52:10.355ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17322024-10-09T22:52:10.355ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17332024-10-09T22:52:10.355ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17342024-10-09T22:52:10.356ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17352024-10-09T22:52:10.359ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17362024-10-09T22:52:10.359ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17372024-10-09T22:52:10.359ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17382024-10-09T22:52:10.359ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17392024-10-09T22:52:10.361ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17402024-10-09T22:52:10.370ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17412024-10-09T22:52:10.370ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17422024-10-09T22:52:10.370ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17432024-10-09T22:52:10.371ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17442024-10-09T22:52:10.373ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17452024-10-09T22:52:10.374ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17462024-10-09T22:52:10.375ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17472024-10-09T22:52:10.378ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17482024-10-09T22:52:10.378ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17492024-10-09T22:52:10.378ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17502024-10-09T22:52:10.380ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17512024-10-09T22:52:10.380ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17522024-10-09T22:52:10.382ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17532024-10-09T22:52:10.385ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
17542024-10-09T22:52:10.385ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17552024-10-09T22:52:10.385ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17562024-10-09T22:52:10.385ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17572024-10-09T22:52:10.386ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17582024-10-09T22:52:10.388ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17592024-10-09T22:52:10.388ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17602024-10-09T22:52:10.388ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17612024-10-09T22:52:10.389ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17622024-10-09T22:52:10.392ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17632024-10-09T22:52:10.392ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17642024-10-09T22:52:10.392ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17652024-10-09T22:52:10.393ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17662024-10-09T22:52:10.397ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17672024-10-09T22:52:10.406ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
17682024-10-09T22:52:10.406ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
17692024-10-09T22:52:10.406ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17702024-10-09T22:52:10.406ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17712024-10-09T22:52:10.407ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17722024-10-09T22:52:10.436ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17732024-10-09T22:52:10.436ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17742024-10-09T22:52:10.437ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17752024-10-09T22:52:10.438ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17762024-10-09T22:52:10.438ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17772024-10-09T22:52:10.439ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17782024-10-09T22:52:10.441ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17792024-10-09T22:52:10.441ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17802024-10-09T22:52:10.441ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17812024-10-09T22:52:10.444ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17822024-10-09T22:52:10.444ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17832024-10-09T22:52:10.444ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17842024-10-09T22:52:10.444ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17852024-10-09T22:52:10.444ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17862024-10-09T22:52:10.447ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17872024-10-09T22:52:10.447ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17882024-10-09T22:52:10.447ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17892024-10-09T22:52:10.448ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17902024-10-09T22:52:10.449ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17912024-10-09T22:52:10.449ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17922024-10-09T22:52:10.450ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
17932024-10-09T22:52:10.450ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17942024-10-09T22:52:10.452ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17952024-10-09T22:52:10.460ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17962024-10-09T22:52:10.460ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17972024-10-09T22:52:10.460ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17982024-10-09T22:52:10.460ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17992024-10-09T22:52:10.461ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18002024-10-09T22:52:10.461ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18012024-10-09T22:52:10.461ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18022024-10-09T22:52:10.463ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18032024-10-09T22:52:10.463ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18042024-10-09T22:52:10.463ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18052024-10-09T22:52:10.464ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18062024-10-09T22:52:10.466ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18072024-10-09T22:52:10.466ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18082024-10-09T22:52:10.466ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18092024-10-09T22:52:10.466ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18102024-10-09T22:52:10.468ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18112024-10-09T22:52:10.489ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
18122024-10-09T22:52:10.490ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18132024-10-09T22:52:10.490ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18142024-10-09T22:52:10.490ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18152024-10-09T22:52:10.530ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18162024-10-09T22:52:10.530ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18172024-10-09T22:52:10.532ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18182024-10-09T22:52:10.555ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18192024-10-09T22:52:10.571ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18202024-10-09T22:52:10.572ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18212024-10-09T22:52:10.575ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18222024-10-09T22:52:10.575ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18232024-10-09T22:52:10.575ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18242024-10-09T22:52:10.578ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18252024-10-09T22:52:10.578ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18262024-10-09T22:52:10.579ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18272024-10-09T22:52:10.589ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
18282024-10-09T22:52:10.589ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18292024-10-09T22:52:10.589ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18302024-10-09T22:52:10.589ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18312024-10-09T22:52:10.593ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18322024-10-09T22:52:10.595ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18332024-10-09T22:52:10.595ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18342024-10-09T22:52:10.595ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18352024-10-09T22:52:10.596ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18362024-10-09T22:52:10.598ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18372024-10-09T22:52:10.598ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18382024-10-09T22:52:10.598ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18392024-10-09T22:52:10.599ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18402024-10-09T22:52:10.602ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18412024-10-09T22:52:10.613ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
18422024-10-09T22:52:10.613ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
18432024-10-09T22:52:10.613ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
18442024-10-09T22:52:10.613ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
18452024-10-09T22:52:10.613ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18462024-10-09T22:52:10.613ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18472024-10-09T22:52:10.614ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18482024-10-09T22:52:10.617ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
18492024-10-09T22:52:10.617ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18502024-10-09T22:52:10.617ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18512024-10-09T22:52:10.618ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18522024-10-09T22:52:10.621ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18532024-10-09T22:52:10.622ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18542024-10-09T22:52:10.623ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18552024-10-09T22:52:10.624ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18562024-10-09T22:52:10.633ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18572024-10-09T22:52:10.651ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
18582024-10-09T22:52:10.651ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18592024-10-09T22:52:10.651ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18602024-10-09T22:52:10.651ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18612024-10-09T22:52:10.667ZDEBGtest_unauthorized (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 61657096-72c3-460a-ac71-be97c4013357, kind: Service { id: 3173ad92-59fe-4065-97ff-35fc539b0d16 }, name: Name("nexus-3173ad92-59fe-4065-97ff-35fc539b0d16"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("external-dns"): [NetworkInterface { id: 96a154a5-9de3-46b0-b7bf-4751f6f36914, kind: Service { id: aa83d74e-a254-46a4-a626-c6ab484c660c }, name: Name("external-dns-aa83d74e-a254-46a4-a626-c6ab484c660c"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
18622024-10-09T22:52:10.667ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
18632024-10-09T22:52:10.667ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18642024-10-09T22:52:10.667ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18652024-10-09T22:52:10.667ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18662024-10-09T22:52:10.668ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18672024-10-09T22:52:10.671ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18682024-10-09T22:52:10.677ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
18692024-10-09T22:52:10.677ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
18702024-10-09T22:52:10.677ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
18712024-10-09T22:52:10.678ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
18722024-10-09T22:52:10.685ZTRACtest_unauthorized (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:52:10.227702Z, allowed_ips: None }
18732024-10-09T22:52:10.685ZDEBGtest_unauthorized (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
18742024-10-09T22:52:10.686ZDEBGtest_unauthorized (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 96a154a5-9de3-46b0-b7bf-4751f6f36914, kind: Service { id: aa83d74e-a254-46a4-a626-c6ab484c660c }, name: Name("external-dns-aa83d74e-a254-46a4-a626-c6ab484c660c"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 61657096-72c3-460a-ac71-be97c4013357, kind: Service { id: 3173ad92-59fe-4065-97ff-35fc539b0d16 }, name: Name("nexus-3173ad92-59fe-4065-97ff-35fc539b0d16"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
18752024-10-09T22:52:10.686ZDEBGtest_unauthorized (nexus): resolved 2 rules for sleds
18762024-10-09T22:52:10.725ZDEBGtest_unauthorized (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:52:02.770496Z, time_modified: 2024-10-09T22:52:02.770496Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(36561), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
18772024-10-09T22:52:10.725ZDEBGtest_unauthorized (nexus): sending firewall rules to sled agents
18782024-10-09T22:52:10.725ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
18792024-10-09T22:52:10.725ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
18802024-10-09T22:52:10.726ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
18812024-10-09T22:52:10.737ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
18822024-10-09T22:52:10.737ZTRACtest_unauthorized (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18832024-10-09T22:52:10.737ZTRACtest_unauthorized (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
18842024-10-09T22:52:10.737ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {} }
18852024-10-09T22:52:10.739ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
18862024-10-09T22:52:10.743ZDEBGtest_unauthorized (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
18872024-10-09T22:52:10.759ZDEBGtest_unauthorized (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
18882024-10-09T22:52:10.851ZDEBGtest_unauthorized (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:36561/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18892024-10-09T22:52:10.853ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:61716 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
18902024-10-09T22:52:10.853ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = PUT remote_addr = [::1]:61716 req_id = 0e3d2489-93ab-4a46-b5da-1cb314119262 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18912024-10-09T22:52:10.855ZINFOtest_unauthorized (dropshot): request completed latency_us = 1193 local_addr = [::1]:36561 method = PUT remote_addr = [::1]:61716 req_id = 0e3d2489-93ab-4a46-b5da-1cb314119262 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18922024-10-09T22:52:10.855ZDEBGtest_unauthorized (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:36561/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "0e3d2489-93ab-4a46-b5da-1cb314119262", "date": "Wed, 09 Oct 2024 22:52:10 GMT"} })
18932024-10-09T22:52:10.857ZINFOtest_unauthorized (nexus): updated firewall rules on 1 sleds
18942024-10-09T22:52:10.857ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18952024-10-09T22:52:10.857ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
18962024-10-09T22:52:10.858ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18972024-10-09T22:52:10.858ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
18982024-10-09T22:52:10.858ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
18992024-10-09T22:52:10.859ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19002024-10-09T22:52:10.859ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19012024-10-09T22:52:10.859ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19022024-10-09T22:52:10.859ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
19032024-10-09T22:52:10.860ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
19042024-10-09T22:52:10.860ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
19052024-10-09T22:52:10.860ZDEBGtest_unauthorized (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
19062024-10-09T22:52:10.860ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19072024-10-09T22:52:10.860ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19082024-10-09T22:52:10.861ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19092024-10-09T22:52:10.861ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
19102024-10-09T22:52:10.861ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
19112024-10-09T22:52:10.861ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
19122024-10-09T22:52:10.861ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
19132024-10-09T22:52:10.861ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19142024-10-09T22:52:10.861ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19152024-10-09T22:52:10.861ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19162024-10-09T22:52:10.863ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19172024-10-09T22:52:10.863ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 4 reason = Signaled
19182024-10-09T22:52:10.863ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
19192024-10-09T22:52:10.863ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19202024-10-09T22:52:10.863ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
19212024-10-09T22:52:10.863ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19222024-10-09T22:52:10.863ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
19232024-10-09T22:52:10.865ZTRACtest_unauthorized (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: ea 13 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:55279 req_id = 5de44076-1cf4-47fc-8dc5-b2e029fab809
19242024-10-09T22:52:10.865ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 59923,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55279 req_id = 5de44076-1cf4-47fc-8dc5-b2e029fab809
19252024-10-09T22:52:10.865ZDEBGtest_unauthorized (store): query key key = _nameservice._tcp
19262024-10-09T22:52:10.865ZDEBGtest_unauthorized (store): query key key = d065e7c0-c8d3-452f-a7c9-20960d250b6f.host
19272024-10-09T22:52:10.865ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:55279 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 40130, target: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal") })) }] req_id = 5de44076-1cf4-47fc-8dc5-b2e029fab809
19282024-10-09T22:52:10.866ZTRACtest_unauthorized (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 76 08 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 v............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:52025 req_id = ea47c59a-95d2-4802-b22f-286cba6866a3
19292024-10-09T22:52:10.866ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30216,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52025 req_id = ea47c59a-95d2-4802-b22f-286cba6866a3
19302024-10-09T22:52:10.866ZDEBGtest_unauthorized (store): query key key = _external-dns._tcp
19312024-10-09T22:52:10.866ZDEBGtest_unauthorized (store): query key key = aa83d74e-a254-46a4-a626-c6ab484c660c.host
19322024-10-09T22:52:10.866ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:52025 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 46067, target: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal") })) }] req_id = ea47c59a-95d2-4802-b22f-286cba6866a3
19332024-10-09T22:52:10.867ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 40130, target: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4992, tv_nsec: 697152356 } })
19342024-10-09T22:52:10.875ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
19352024-10-09T22:52:10.875ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 46067, target: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4992, tv_nsec: 705486307 } })
19362024-10-09T22:52:10.875ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
19372024-10-09T22:52:10.875ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19382024-10-09T22:52:10.876ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19392024-10-09T22:52:10.876ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19402024-10-09T22:52:10.876ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19412024-10-09T22:52:10.876ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19422024-10-09T22:52:10.876ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
19432024-10-09T22:52:10.876ZTRACtest_unauthorized (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19442024-10-09T22:52:10.876ZTRACtest_unauthorized (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
19452024-10-09T22:52:10.877ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {} }
19462024-10-09T22:52:10.877ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
19472024-10-09T22:52:10.878ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19482024-10-09T22:52:10.878ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19492024-10-09T22:52:10.878ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19502024-10-09T22:52:10.878ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
19512024-10-09T22:52:10.879ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
19522024-10-09T22:52:10.881ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: c5 ec 01 00 00 01 00 00 00 00 00 01 24 64 30 36 ............$d06\n0010: 35 65 37 63 30 2d 63 38 64 33 2d 34 35 32 66 2d 5e7c0-c8d3-452f-\n0020: 61 37 63 39 2d 32 30 39 36 30 64 32 35 30 62 36 a7c9-20960d250b6\n0030: 66 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 f.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:55867 req_id = 9f251ec6-c0fd-4976-9985-a9245259f868
19532024-10-09T22:52:10.881ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50668,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 100,\n 48,\n 54,\n 53,\n 101,\n 55,\n 99,\n 48,\n 45,\n 99,\n 56,\n 100,\n 51,\n 45,\n 52,\n 53,\n 50,\n 102,\n 45,\n 97,\n 55,\n 99,\n 57,\n 45,\n 50,\n 48,\n 57,\n 54,\n 48,\n 100,\n 50,\n 53,\n 48,\n 98,\n 54,\n 102,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55867 req_id = 9f251ec6-c0fd-4976-9985-a9245259f868
19542024-10-09T22:52:10.881ZDEBGtest_unauthorized (store): query key key = d065e7c0-c8d3-452f-a7c9-20960d250b6f.host
19552024-10-09T22:52:10.881ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:55867 query = LowerQuery { name: LowerName(Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal.")), original: Query { name: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("d065e7c0-c8d3-452f-a7c9-20960d250b6f.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 9f251ec6-c0fd-4976-9985-a9245259f868
19562024-10-09T22:52:10.881ZTRACtest_unauthorized (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 0b 8e 01 00 00 01 00 00 00 00 00 01 24 61 61 38 ............$aa8\n0010: 33 64 37 34 65 2d 61 32 35 34 2d 34 36 61 34 2d 3d74e-a254-46a4-\n0020: 61 36 32 36 2d 63 36 61 62 34 38 34 63 36 36 30 a626-c6ab484c660\n0030: 63 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 c.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:61934 req_id = d833a78b-15f0-4274-9db3-d851c944a1d9
19572024-10-09T22:52:10.881ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 2958,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 97,\n 97,\n 56,\n 51,\n 100,\n 55,\n 52,\n 101,\n 45,\n 97,\n 50,\n 53,\n 52,\n 45,\n 52,\n 54,\n 97,\n 52,\n 45,\n 97,\n 54,\n 50,\n 54,\n 45,\n 99,\n 54,\n 97,\n 98,\n 52,\n 56,\n 52,\n 99,\n 54,\n 54,\n 48,\n 99,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61934 req_id = d833a78b-15f0-4274-9db3-d851c944a1d9
19582024-10-09T22:52:10.881ZDEBGtest_unauthorized (store): query key key = aa83d74e-a254-46a4-a626-c6ab484c660c.host
19592024-10-09T22:52:10.881ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:61934 query = LowerQuery { name: LowerName(Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal.")), original: Query { name: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("aa83d74e-a254-46a4-a626-c6ab484c660c.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = d833a78b-15f0-4274-9db3-d851c944a1d9
19602024-10-09T22:52:10.886ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19612024-10-09T22:52:10.892ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
19622024-10-09T22:52:10.892ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19632024-10-09T22:52:10.893ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19642024-10-09T22:52:10.893ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19652024-10-09T22:52:10.893ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19662024-10-09T22:52:10.901ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
19672024-10-09T22:52:10.901ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
19682024-10-09T22:52:10.901ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19692024-10-09T22:52:10.902ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
19702024-10-09T22:52:10.902ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19712024-10-09T22:52:10.909ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19722024-10-09T22:52:10.912ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
19732024-10-09T22:52:10.912ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
19742024-10-09T22:52:10.912ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
19752024-10-09T22:52:10.912ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19762024-10-09T22:52:10.912ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19772024-10-09T22:52:10.912ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19782024-10-09T22:52:10.912ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19792024-10-09T22:52:10.913ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19802024-10-09T22:52:10.914ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:40130] } background_task = dns_servers_internal dns_group = internal
19812024-10-09T22:52:10.914ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 54.232368ms iteration = 2 status = {"addresses":["[::1]:40130"]}
19822024-10-09T22:52:10.914ZINFOtest_unauthorized (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:46067] } background_task = dns_servers_external dns_group = external
19832024-10-09T22:52:10.914ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 53.396748ms iteration = 2 status = {"addresses":["[::1]:46067"]}
19842024-10-09T22:52:10.914ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
19852024-10-09T22:52:10.914ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
19862024-10-09T22:52:10.914ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 27.229\u{b5}s iteration = 2 status = {"error":"no config"}
19872024-10-09T22:52:10.914ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
19882024-10-09T22:52:10.914ZWARNtest_unauthorized (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
19892024-10-09T22:52:10.915ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 14.09\u{b5}s iteration = 2 status = {"error":"no config"}
19902024-10-09T22:52:10.918ZDEBGtest_unauthorized (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19912024-10-09T22:52:10.927ZDEBGtest_unauthorized (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
19922024-10-09T22:52:10.927ZINFOtest_unauthorized (nexus): Rack initialized
19932024-10-09T22:52:10.927ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19942024-10-09T22:52:10.928ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
19952024-10-09T22:52:10.928ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19962024-10-09T22:52:10.930ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19972024-10-09T22:52:10.944ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19982024-10-09T22:52:10.947ZDEBGtest_unauthorized (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
19992024-10-09T22:52:10.947ZDEBGtest_unauthorized (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
20002024-10-09T22:52:10.947ZDEBGtest_unauthorized (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
20012024-10-09T22:52:10.947ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20022024-10-09T22:52:10.947ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20032024-10-09T22:52:10.947ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20042024-10-09T22:52:10.947ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20052024-10-09T22:52:10.948ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20062024-10-09T22:52:10.948ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
20072024-10-09T22:52:10.948ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20082024-10-09T22:52:10.948ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20092024-10-09T22:52:10.948ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20102024-10-09T22:52:10.949ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20112024-10-09T22:52:10.950ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
20122024-10-09T22:52:10.950ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
20132024-10-09T22:52:10.951ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20142024-10-09T22:52:10.959ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
20152024-10-09T22:52:10.959ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20162024-10-09T22:52:10.959ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20172024-10-09T22:52:10.960ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20182024-10-09T22:52:10.962ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20192024-10-09T22:52:10.972ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20202024-10-09T22:52:10.972ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20212024-10-09T22:52:10.972ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20222024-10-09T22:52:10.973ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20232024-10-09T22:52:10.973ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20242024-10-09T22:52:10.981ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
20252024-10-09T22:52:10.984ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20262024-10-09T22:52:10.984ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20272024-10-09T22:52:10.985ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20282024-10-09T22:52:10.985ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
20292024-10-09T22:52:10.985ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = f39d3c64-f777-4bfa-9e66-6fd70f43f42b dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
20302024-10-09T22:52:10.986ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
20312024-10-09T22:52:10.986ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20322024-10-09T22:52:10.986ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20332024-10-09T22:52:10.986ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20342024-10-09T22:52:10.986ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20352024-10-09T22:52:10.987ZDEBGtest_unauthorized (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
20362024-10-09T22:52:10.987ZDEBGtest_unauthorized (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 48fa2664-22fb-4347-ba58-0a664db0d7bd dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
20372024-10-09T22:52:10.987ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20382024-10-09T22:52:10.996ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20392024-10-09T22:52:10.996ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20402024-10-09T22:52:10.996ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20412024-10-09T22:52:10.997ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20422024-10-09T22:52:10.998ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20432024-10-09T22:52:10.999ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20442024-10-09T22:52:10.999ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20452024-10-09T22:52:10.999ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: c8 c9 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:53192 req_id = 75c580a0-ca76-4260-bb24-0c72b827025c
20462024-10-09T22:52:11.000ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 51401,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53192 req_id = 75c580a0-ca76-4260-bb24-0c72b827025c
20472024-10-09T22:52:11.005ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
20482024-10-09T22:52:11.005ZDEBGtest_unauthorized (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
20492024-10-09T22:52:11.006ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
20502024-10-09T22:52:11.006ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:53192 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 49138, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39308, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 75c580a0-ca76-4260-bb24-0c72b827025c
20512024-10-09T22:52:11.006ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20522024-10-09T22:52:11.019ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
20532024-10-09T22:52:11.019ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
20542024-10-09T22:52:11.019ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
20552024-10-09T22:52:11.020ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
20562024-10-09T22:52:11.020ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20572024-10-09T22:52:11.029ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20582024-10-09T22:52:11.029ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20592024-10-09T22:52:11.029ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20602024-10-09T22:52:11.029ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20612024-10-09T22:52:11.035ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 49138, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39308, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4992, tv_nsec: 865182846 } })
20622024-10-09T22:52:11.035ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
20632024-10-09T22:52:11.035ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
20642024-10-09T22:52:11.036ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = f39d3c64-f777-4bfa-9e66-6fd70f43f42b dns_zone_name = control-plane.oxide.internal found_so_far = 18 version = 1
20652024-10-09T22:52:11.037ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
20662024-10-09T22:52:11.037ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
20672024-10-09T22:52:11.037ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 178.197384ms iteration = 2 status = {"generation":1}
20682024-10-09T22:52:11.037ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
20692024-10-09T22:52:11.120ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:40130 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:40130] } uri = http://[::1]:40130/config
20702024-10-09T22:52:11.121ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
20712024-10-09T22:52:11.121ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20722024-10-09T22:52:11.121ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20732024-10-09T22:52:11.121ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20742024-10-09T22:52:11.122ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20752024-10-09T22:52:11.122ZDEBGtest_unauthorized (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 48fa2664-22fb-4347-ba58-0a664db0d7bd dns_zone_name = oxide-dev.test found_so_far = 1 version = 2
20762024-10-09T22:52:11.122ZDEBGtest_unauthorized (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
20772024-10-09T22:52:11.122ZINFOtest_unauthorized (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
20782024-10-09T22:52:11.122ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 262.066337ms iteration = 2 status = {"generation":2}
20792024-10-09T22:52:11.122ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
20802024-10-09T22:52:11.253ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:46067 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:46067] } uri = http://[::1]:46067/config
20812024-10-09T22:52:11.259ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20822024-10-09T22:52:11.266ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
20832024-10-09T22:52:11.266ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20842024-10-09T22:52:11.266ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20852024-10-09T22:52:11.267ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20862024-10-09T22:52:11.268ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20872024-10-09T22:52:11.268ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
20882024-10-09T22:52:11.268ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20892024-10-09T22:52:11.268ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:40130 remote_addr = [::1]:50739
20902024-10-09T22:52:11.268ZINFOtest_unauthorized (http): accepted connection kind = dns local_addr = [::1]:46067 remote_addr = [::1]:51392
20912024-10-09T22:52:11.271ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:40130 method = PUT remote_addr = [::1]:50739 req_id = 1f71e7f7-dc7e-4a4f-b9a4-c9839dc9d50a uri = /config
20922024-10-09T22:52:11.271ZTRACtest_unauthorized (http): incoming request kind = dns local_addr = [::1]:46067 method = PUT remote_addr = [::1]:51392 req_id = ff78d9b5-2ec4-48c9-aed1-e874ca110940 uri = /config
20932024-10-09T22:52:11.271ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: f8 b5 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:50499 req_id = db316d76-22af-4b61-b927-5d2bae4bf85c
20942024-10-09T22:52:11.271ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 63669,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50499 req_id = db316d76-22af-4b61-b927-5d2bae4bf85c
20952024-10-09T22:52:11.272ZDEBGtest_unauthorized (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
20962024-10-09T22:52:11.272ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:50499 query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = db316d76-22af-4b61-b927-5d2bae4bf85c
20972024-10-09T22:52:11.272ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 52 7e 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e R~..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:54362 req_id = f33a999f-8a23-41eb-ba18-07f16f9d5870
20982024-10-09T22:52:11.272ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 21118,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54362 req_id = f33a999f-8a23-41eb-ba18-07f16f9d5870
20992024-10-09T22:52:11.272ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
21002024-10-09T22:52:11.272ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:54362 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = f33a999f-8a23-41eb-ba18-07f16f9d5870
21012024-10-09T22:52:11.273ZINFOtest_unauthorized (store): attempting generation update new_generation = 1 req_id = 1f71e7f7-dc7e-4a4f-b9a4-c9839dc9d50a
21022024-10-09T22:52:11.273ZINFOtest_unauthorized (store): updated generation new_generation = 1 req_id = 1f71e7f7-dc7e-4a4f-b9a4-c9839dc9d50a
21032024-10-09T22:52:11.273ZINFOtest_unauthorized (store): attempting generation update new_generation = 2 req_id = ff78d9b5-2ec4-48c9-aed1-e874ca110940
21042024-10-09T22:52:11.273ZINFOtest_unauthorized (store): pruning trees for generations newer than 0
21052024-10-09T22:52:11.273ZDEBGtest_unauthorized (store): creating tree tree_name = generation_2_zone_oxide-dev.test
21062024-10-09T22:52:11.275ZDEBGtest_unauthorized (store): updating current config
21072024-10-09T22:52:11.281ZDEBGtest_unauthorized (store): flushing default tree
21082024-10-09T22:52:11.291ZINFOtest_unauthorized (store): pruning trees for generations older than 2 keep = 3
21092024-10-09T22:52:11.291ZINFOtest_unauthorized (store): updated generation new_generation = 2 req_id = ff78d9b5-2ec4-48c9-aed1-e874ca110940
21102024-10-09T22:52:11.293ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 21999 local_addr = [::1]:40130 method = PUT remote_addr = [::1]:50739 req_id = 1f71e7f7-dc7e-4a4f-b9a4-c9839dc9d50a response_code = 204 uri = /config
21112024-10-09T22:52:11.293ZINFOtest_unauthorized (http): request completed kind = dns latency_us = 21956 local_addr = [::1]:46067 method = PUT remote_addr = [::1]:51392 req_id = ff78d9b5-2ec4-48c9-aed1-e874ca110940 response_code = 204 uri = /config
21122024-10-09T22:52:11.629ZTRACtest_unauthorized (DnsResolver): lookup_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
21132024-10-09T22:52:11.636ZINFOtest_unauthorized (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2024-10-09T22:52:00.782181Z, time_modified: 2024-10-09T22:52:00.782181Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, db_silo: Silo { identity: SiloIdentity { id: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:52:09.887364Z, time_modified: 2024-10-09T22:52:09.887364Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, db_silo: Silo { identity: SiloIdentity { id: 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2024-10-09T22:52:09.887364Z, time_modified: 2024-10-09T22:52:09.887364Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
21142024-10-09T22:52:11.637ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 775.623475ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"91d6eb6c-962a-46ba-aaee-3f0e76ce2fef","tls_certs":[]}},"default_endpoint":{"silo_id":"91d6eb6c-962a-46ba-aaee-3f0e76ce2fef","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 91d6eb6c-962a-46ba-aaee-3f0e76ce2fef with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
21152024-10-09T22:52:11.637ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:40130 generation = 1 result = Ok(Response { url: "http://[::1]:40130/config", status: 204, headers: {"x-request-id": "1f71e7f7-dc7e-4a4f-b9a4-c9839dc9d50a", "date": "Wed, 09 Oct 2024 22:52:10 GMT"} }) servers = DnsServersList { addresses: [[::1]:40130] }
21162024-10-09T22:52:11.637ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:40130 generation = 1 servers = DnsServersList { addresses: [[::1]:40130] }
21172024-10-09T22:52:11.640ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:40130] }
21182024-10-09T22:52:11.640ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 603.628654ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:40130":{"Ok":null}}}
21192024-10-09T22:52:11.640ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:46067 generation = 2 result = Ok(Response { url: "http://[::1]:46067/config", status: 204, headers: {"x-request-id": "ff78d9b5-2ec4-48c9-aed1-e874ca110940", "date": "Wed, 09 Oct 2024 22:52:10 GMT"} }) servers = DnsServersList { addresses: [[::1]:46067] }
21202024-10-09T22:52:11.641ZINFOtest_unauthorized (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:46067 generation = 2 servers = DnsServersList { addresses: [[::1]:46067] }
21212024-10-09T22:52:11.646ZINFOtest_unauthorized (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:46067] }
21222024-10-09T22:52:11.647ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 524.864738ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:46067":{"Ok":null}}}
21232024-10-09T22:52:11.667ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21242024-10-09T22:52:11.668ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21252024-10-09T22:52:11.668ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21262024-10-09T22:52:11.668ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21272024-10-09T22:52:11.669ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21282024-10-09T22:52:11.692ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 4b c5 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c K............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:62627 req_id = 2b907b29-4aa2-4fb4-9b11-fb52e2612ccc
21292024-10-09T22:52:11.692ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 19397,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62627 req_id = 2b907b29-4aa2-4fb4-9b11-fb52e2612ccc
21302024-10-09T22:52:11.692ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
21312024-10-09T22:52:11.692ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 19397, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:62627 req_id = 2b907b29-4aa2-4fb4-9b11-fb52e2612ccc
21322024-10-09T22:52:11.697ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
21332024-10-09T22:52:11.697ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:49138
21342024-10-09T22:52:11.697ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/ignition
21352024-10-09T22:52:11.698ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21362024-10-09T22:52:11.698ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21372024-10-09T22:52:11.698ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21382024-10-09T22:52:11.699ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21392024-10-09T22:52:11.821ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21402024-10-09T22:52:11.821ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21412024-10-09T22:52:11.821ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21422024-10-09T22:52:11.824ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21432024-10-09T22:52:11.839ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21442024-10-09T22:52:11.850ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21452024-10-09T22:52:11.850ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21462024-10-09T22:52:11.850ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21472024-10-09T22:52:11.851ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21482024-10-09T22:52:11.851ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21492024-10-09T22:52:11.851ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21502024-10-09T22:52:11.852ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21512024-10-09T22:52:11.852ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "58027f2e-caac-48c7-acef-f757ea18e163", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:10 GMT"} })
21522024-10-09T22:52:11.853ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0
21532024-10-09T22:52:11.864ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21542024-10-09T22:52:11.864ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21552024-10-09T22:52:11.864ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21562024-10-09T22:52:11.865ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21572024-10-09T22:52:11.876ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0e5199fc-93ef-4065-b743-ae1107be70fc", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
21582024-10-09T22:52:11.877ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=0
21592024-10-09T22:52:11.883ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21602024-10-09T22:52:11.883ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21612024-10-09T22:52:11.883ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21622024-10-09T22:52:11.884ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21632024-10-09T22:52:11.901ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21642024-10-09T22:52:11.911ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21652024-10-09T22:52:11.912ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21662024-10-09T22:52:11.912ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21672024-10-09T22:52:11.912ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21682024-10-09T22:52:11.915ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1c13efc8-3667-475c-aad8-0882d8ad0ddd", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
21692024-10-09T22:52:11.915ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=1
21702024-10-09T22:52:11.915ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21712024-10-09T22:52:11.915ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21722024-10-09T22:52:11.916ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21732024-10-09T22:52:11.919ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21742024-10-09T22:52:11.919ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21752024-10-09T22:52:11.920ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21762024-10-09T22:52:11.921ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e3fb240d-0c08-45b4-a59d-272b2cea80dd", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
21772024-10-09T22:52:11.921ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=0
21782024-10-09T22:52:11.922ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21792024-10-09T22:52:11.922ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21802024-10-09T22:52:11.922ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21812024-10-09T22:52:11.925ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21822024-10-09T22:52:11.925ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21832024-10-09T22:52:11.925ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21842024-10-09T22:52:11.925ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21852024-10-09T22:52:11.925ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21862024-10-09T22:52:11.926ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4be7f3d0-02f8-479a-af89-9189146daf89", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
21872024-10-09T22:52:11.926ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=1
21882024-10-09T22:52:11.928ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21892024-10-09T22:52:11.928ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21902024-10-09T22:52:11.933ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21912024-10-09T22:52:11.934ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21922024-10-09T22:52:11.936ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "611f38d8-e59a-460a-9482-e804aa651cf4", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
21932024-10-09T22:52:11.936ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=0
21942024-10-09T22:52:11.936ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21952024-10-09T22:52:11.936ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21962024-10-09T22:52:11.936ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
21972024-10-09T22:52:11.937ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21982024-10-09T22:52:11.939ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21992024-10-09T22:52:11.947ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
22002024-10-09T22:52:11.947ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
22012024-10-09T22:52:11.947ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22022024-10-09T22:52:11.947ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22032024-10-09T22:52:11.948ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22042024-10-09T22:52:11.971ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22052024-10-09T22:52:11.972ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22062024-10-09T22:52:11.973ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22072024-10-09T22:52:11.978ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22082024-10-09T22:52:11.978ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22092024-10-09T22:52:11.979ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22102024-10-09T22:52:11.979ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a78c407c-2de2-495e-a56b-11e849f3408c", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22112024-10-09T22:52:11.979ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=1
22122024-10-09T22:52:11.983ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22132024-10-09T22:52:11.983ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22142024-10-09T22:52:11.984ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22152024-10-09T22:52:11.986ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
22162024-10-09T22:52:11.986ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22172024-10-09T22:52:11.986ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22182024-10-09T22:52:11.986ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22192024-10-09T22:52:11.987ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22202024-10-09T22:52:11.988ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9593ed1a-2aea-41d6-844a-1ea0ed5d548c", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22212024-10-09T22:52:11.988ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cmpa
22222024-10-09T22:52:11.989ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22232024-10-09T22:52:11.989ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22242024-10-09T22:52:11.989ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22252024-10-09T22:52:11.990ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22262024-10-09T22:52:11.990ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "839636f7-d913-4fd5-af37-89d856fa9fb1", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22272024-10-09T22:52:11.991ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
22282024-10-09T22:52:11.992ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "670b1e31-8f22-4224-a39c-eb80596aabee", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22292024-10-09T22:52:11.992ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
22302024-10-09T22:52:11.993ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22312024-10-09T22:52:11.993ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22322024-10-09T22:52:11.993ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22332024-10-09T22:52:11.994ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22342024-10-09T22:52:11.995ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6d25d53a-191c-4c96-bf98-d440f4834417", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22352024-10-09T22:52:11.995ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
22362024-10-09T22:52:11.996ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22372024-10-09T22:52:12.005ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22382024-10-09T22:52:12.006ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22392024-10-09T22:52:12.006ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
22402024-10-09T22:52:12.006ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22412024-10-09T22:52:12.006ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22422024-10-09T22:52:12.006ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22432024-10-09T22:52:12.006ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22442024-10-09T22:52:12.008ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f0b145ff-10fb-4f5a-9c32-d6fed4568288", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22452024-10-09T22:52:12.008ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1
22462024-10-09T22:52:12.009ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22472024-10-09T22:52:12.009ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22482024-10-09T22:52:12.009ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22492024-10-09T22:52:12.009ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22502024-10-09T22:52:12.011ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "182e5cf6-c816-4047-b2f4-174a1c123884", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22512024-10-09T22:52:12.011ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=0
22522024-10-09T22:52:12.012ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22532024-10-09T22:52:12.012ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22542024-10-09T22:52:12.012ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22552024-10-09T22:52:12.012ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22562024-10-09T22:52:12.020ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22572024-10-09T22:52:12.044ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
22582024-10-09T22:52:12.068ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22592024-10-09T22:52:12.069ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22602024-10-09T22:52:12.070ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22612024-10-09T22:52:12.072ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d0d4160f-ce3e-4f2c-a99f-ef32e7dd3832", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22622024-10-09T22:52:12.073ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=1
22632024-10-09T22:52:12.074ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22642024-10-09T22:52:12.075ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22652024-10-09T22:52:12.075ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22662024-10-09T22:52:12.077ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22672024-10-09T22:52:12.078ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22682024-10-09T22:52:12.084ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22692024-10-09T22:52:12.087ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "07832665-19a9-41ba-bb51-19e88e438ae7", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22702024-10-09T22:52:12.088ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=0
22712024-10-09T22:52:12.088ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22722024-10-09T22:52:12.088ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22732024-10-09T22:52:12.089ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22742024-10-09T22:52:12.094ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22752024-10-09T22:52:12.095ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22762024-10-09T22:52:12.097ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22772024-10-09T22:52:12.103ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22782024-10-09T22:52:12.104ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22792024-10-09T22:52:12.104ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22802024-10-09T22:52:12.104ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22812024-10-09T22:52:12.105ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22822024-10-09T22:52:12.113ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22832024-10-09T22:52:12.113ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22842024-10-09T22:52:12.113ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22852024-10-09T22:52:12.114ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22862024-10-09T22:52:12.121ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22872024-10-09T22:52:12.121ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22882024-10-09T22:52:12.121ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22892024-10-09T22:52:12.122ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22902024-10-09T22:52:12.138ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "d104dea8-b991-46d0-8418-367b3c7bb520", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
22912024-10-09T22:52:12.138ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=1
22922024-10-09T22:52:12.140ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22932024-10-09T22:52:12.177ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22942024-10-09T22:52:12.177ZTRACtest_unauthorized (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22952024-10-09T22:52:12.177ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22962024-10-09T22:52:12.177ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22972024-10-09T22:52:12.177ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22982024-10-09T22:52:12.177ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
22992024-10-09T22:52:12.178ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23002024-10-09T22:52:12.187ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
23012024-10-09T22:52:12.187ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23022024-10-09T22:52:12.187ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23032024-10-09T22:52:12.188ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23042024-10-09T22:52:12.195ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23052024-10-09T22:52:12.195ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23062024-10-09T22:52:12.195ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23072024-10-09T22:52:12.196ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23082024-10-09T22:52:12.226ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23092024-10-09T22:52:12.238ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
23102024-10-09T22:52:12.238ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23112024-10-09T22:52:12.238ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23122024-10-09T22:52:12.238ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23132024-10-09T22:52:12.258ZDEBGtest_unauthorized (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 96a154a5-9de3-46b0-b7bf-4751f6f36914, kind: Service { id: aa83d74e-a254-46a4-a626-c6ab484c660c }, name: Name("external-dns-aa83d74e-a254-46a4-a626-c6ab484c660c"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: 61657096-72c3-460a-ac71-be97c4013357, kind: Service { id: 3173ad92-59fe-4065-97ff-35fc539b0d16 }, name: Name("nexus-3173ad92-59fe-4065-97ff-35fc539b0d16"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
23142024-10-09T22:52:12.258ZTRACtest_unauthorized (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
23152024-10-09T22:52:12.258ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23162024-10-09T22:52:12.258ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23172024-10-09T22:52:12.258ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23182024-10-09T22:52:12.259ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23192024-10-09T22:52:12.267ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23202024-10-09T22:52:12.273ZDEBGtest_unauthorized (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
23212024-10-09T22:52:12.273ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23222024-10-09T22:52:12.273ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23232024-10-09T22:52:12.273ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23242024-10-09T22:52:12.274ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "574c845e-d980-429a-92b7-8c2e8c102ffc", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23252024-10-09T22:52:12.274ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/stage0/caboose?firmware_slot=0
23262024-10-09T22:52:12.285ZTRACtest_unauthorized (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2024-10-09T22:24:05.243015Z, time_modified: 2024-10-09T22:52:10.227702Z, allowed_ips: None }
23272024-10-09T22:52:12.285ZDEBGtest_unauthorized (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
23282024-10-09T22:52:12.285ZDEBGtest_unauthorized (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 96a154a5-9de3-46b0-b7bf-4751f6f36914, kind: Service { id: aa83d74e-a254-46a4-a626-c6ab484c660c }, name: Name("external-dns-aa83d74e-a254-46a4-a626-c6ab484c660c"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 61657096-72c3-460a-ac71-be97c4013357, kind: Service { id: 3173ad92-59fe-4065-97ff-35fc539b0d16 }, name: Name("nexus-3173ad92-59fe-4065-97ff-35fc539b0d16"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
23292024-10-09T22:52:12.286ZDEBGtest_unauthorized (InternalApi): resolved 2 rules for sleds
23302024-10-09T22:52:12.289ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ef7b1502-aabd-47f7-80da-542f10f17e1c", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23312024-10-09T22:52:12.289ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/stage0/caboose?firmware_slot=1
23322024-10-09T22:52:12.292ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "131f4986-3a44-4aef-ba35-e40ed974822a", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23332024-10-09T22:52:12.292ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/cmpa
23342024-10-09T22:52:12.293ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ea5ed946-53d6-4447-8307-4ca13e8e1a6e", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23352024-10-09T22:52:12.293ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/cfpa
23362024-10-09T22:52:12.294ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2be80373-d914-479c-9544-d303ea733a56", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23372024-10-09T22:52:12.295ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/cfpa
23382024-10-09T22:52:12.296ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b7b5486c-87f9-47b3-8ab4-63d5ecd5d048", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23392024-10-09T22:52:12.296ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/cfpa
23402024-10-09T22:52:12.297ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e37c039b-3e9f-49d6-bd0a-323fd58b6787", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23412024-10-09T22:52:12.297ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0
23422024-10-09T22:52:12.299ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2e210cab-070d-471a-bc24-be9ceee94eeb", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23432024-10-09T22:52:12.299ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/sp/caboose?firmware_slot=0
23442024-10-09T22:52:12.302ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "28b61f00-121b-41db-ac3f-bba66d72e0ce", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23452024-10-09T22:52:12.302ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/sp/caboose?firmware_slot=1
23462024-10-09T22:52:12.306ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d70faf99-7407-4a93-b258-dec33307b495", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23472024-10-09T22:52:12.306ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/caboose?firmware_slot=0
23482024-10-09T22:52:12.325ZDEBGtest_unauthorized (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2024-10-09T22:52:02.770496Z, time_modified: 2024-10-09T22:52:02.770496Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(36561), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)) }]
23492024-10-09T22:52:12.326ZDEBGtest_unauthorized (InternalApi): sending firewall rules to sled agents
23502024-10-09T22:52:12.326ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23512024-10-09T22:52:12.326ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23522024-10-09T22:52:12.326ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23532024-10-09T22:52:12.329ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "81677cd7-f191-40da-b0e6-6c50ef26637f", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23542024-10-09T22:52:12.329ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/caboose?firmware_slot=1
23552024-10-09T22:52:12.329ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
23562024-10-09T22:52:12.330ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23572024-10-09T22:52:12.330ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
23582024-10-09T22:52:12.330ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
23592024-10-09T22:52:12.330ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
23602024-10-09T22:52:12.334ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23612024-10-09T22:52:12.345ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
23622024-10-09T22:52:12.473ZDEBGtest_unauthorized (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:36561/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23632024-10-09T22:52:12.474ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:53229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23642024-10-09T22:52:12.481ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = PUT remote_addr = [::1]:53229 req_id = 4885ed68-6470-4878-b556-f75a45fbf9e3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23652024-10-09T22:52:12.483ZINFOtest_unauthorized (dropshot): request completed latency_us = 1509 local_addr = [::1]:36561 method = PUT remote_addr = [::1]:53229 req_id = 4885ed68-6470-4878-b556-f75a45fbf9e3 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23662024-10-09T22:52:12.483ZDEBGtest_unauthorized (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:36561/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "4885ed68-6470-4878-b556-f75a45fbf9e3", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
23672024-10-09T22:52:12.487ZINFOtest_unauthorized (InternalApi): updated firewall rules on 1 sleds
23682024-10-09T22:52:12.487ZINFOtest_unauthorized (nexus): plumbed initial IP allowlist
23692024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /
23702024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /access
23712024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /assets/{path}
23722024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /device/auth
23732024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /device/confirm
23742024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /device/success
23752024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /device/token
23762024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /device/verify
23772024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /experimental/v1/probes
23782024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /experimental/v1/probes
23792024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /experimental/v1/probes/{probe}
23802024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /experimental/v1/probes/{probe}
23812024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /images
23822024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /login
23832024-10-09T22:52:12.565ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /login/{silo_name}/local
23842024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /login/{silo_name}/saml/{provider_name}
23852024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /login/{silo_name}/saml/{provider_name}
23862024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect
23872024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /lookup/{path}
23882024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /projects/{path}
23892024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /projects-new
23902024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /settings/{path}
23912024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /system/{path}
23922024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /utilization
23932024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/certificates
23942024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/certificates
23952024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/certificates/{certificate}
23962024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/certificates/{certificate}
23972024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/disks
23982024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/disks
23992024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/disks/{disk}
24002024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/disks/{disk}
24012024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/disks/{disk}/bulk-write
24022024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/disks/{disk}/bulk-write-start
24032024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/disks/{disk}/bulk-write-stop
24042024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/disks/{disk}/finalize
24052024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/disks/{disk}/metrics/{metric}
24062024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/floating-ips
24072024-10-09T22:52:12.566ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/floating-ips
24082024-10-09T22:52:12.567ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/floating-ips/{floating_ip}
24092024-10-09T22:52:12.567ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/floating-ips/{floating_ip}
24102024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/floating-ips/{floating_ip}
24112024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/floating-ips/{floating_ip}/attach
24122024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/floating-ips/{floating_ip}/detach
24132024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/groups
24142024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/groups/{group_id}
24152024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/images
24162024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/images
24172024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/images/{image}
24182024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/images/{image}
24192024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/images/{image}/demote
24202024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/images/{image}/promote
24212024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances
24222024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances
24232024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/instances/{instance}
24242024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}
24252024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/instances/{instance}
24262024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}/disks
24272024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/disks/attach
24282024-10-09T22:52:12.568ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/disks/detach
24292024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}/external-ips
24302024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral
24312024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/external-ips/ephemeral
24322024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/reboot
24332024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}/serial-console
24342024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}/serial-console/stream
24352024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/instances/{instance}/ssh-public-keys
24362024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/start
24372024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/instances/{instance}/stop
24382024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/internet-gateway-ip-addresses
24392024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/internet-gateway-ip-addresses
24402024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/internet-gateway-ip-addresses/{address}
24412024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/internet-gateway-ip-pools
24422024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/internet-gateway-ip-pools
24432024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/internet-gateway-ip-pools/{pool}
24442024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/internet-gateways
24452024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/internet-gateways
24462024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/internet-gateways/{gateway}
24472024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/internet-gateways/{gateway}
24482024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/ip-pools
24492024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/ip-pools/{pool}
24502024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/login/{silo_name}/local
24512024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/logout
24522024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/me
24532024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/me/groups
24542024-10-09T22:52:12.569ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/me/ssh-keys
24552024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/me/ssh-keys
24562024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/me/ssh-keys/{ssh_key}
24572024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/me/ssh-keys/{ssh_key}
24582024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/metrics/{metric_name}
24592024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/network-interfaces
24602024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/network-interfaces
24612024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/network-interfaces/{interface}
24622024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/network-interfaces/{interface}
24632024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/network-interfaces/{interface}
24642024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/ping
24652024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/policy
24662024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/policy
24672024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/projects
24682024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/projects
24692024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/projects/{project}
24702024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/projects/{project}
24712024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/projects/{project}
24722024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/projects/{project}/policy
24732024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/projects/{project}/policy
24742024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/snapshots
24752024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/snapshots
24762024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/snapshots/{snapshot}
24772024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/snapshots/{snapshot}
24782024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/disks
24792024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/disks/{disk_id}
24802024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/racks
24812024-10-09T22:52:12.570ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/racks/{rack_id}
24822024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/sleds
24832024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/hardware/sleds
24842024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/sleds/{sled_id}
24852024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks
24862024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances
24872024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy
24882024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/sleds-uninitialized
24892024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/switch-port
24902024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings
24912024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/hardware/switch-port/{port}/settings
24922024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/switch-port/{port}/status
24932024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/switches
24942024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/hardware/switches/{switch_id}
24952024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/identity-providers
24962024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/identity-providers/local/users
24972024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/identity-providers/local/users/{user_id}
24982024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password
24992024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/identity-providers/saml
25002024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/identity-providers/saml/{provider}
25012024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools
25022024-10-09T22:52:12.571ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools
25032024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/ip-pools/{pool}
25042024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools/{pool}
25052024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/ip-pools/{pool}
25062024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools/{pool}/ranges
25072024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools/{pool}/ranges/add
25082024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove
25092024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools/{pool}/silos
25102024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools/{pool}/silos
25112024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo}
25122024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo}
25132024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools/{pool}/utilization
25142024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools-service
25152024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/ip-pools-service/ranges
25162024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools-service/ranges/add
25172024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/ip-pools-service/ranges/remove
25182024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/metrics/{metric_name}
25192024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/address-lot
25202024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/address-lot
25212024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/networking/address-lot/{address_lot}
25222024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks
25232024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/allow-list
25242024-10-09T22:52:12.572ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/networking/allow-list
25252024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/bfd-disable
25262024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/bfd-enable
25272024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bfd-status
25282024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/networking/bgp
25292024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp
25302024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/bgp
25312024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-announce-set
25322024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/networking/bgp-announce-set
25332024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set}
25342024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
25352024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-exported
25362024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-message-history
25372024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-routes-ipv4
25382024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/bgp-status
25392024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/loopback-address
25402024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/loopback-address
25412024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
25422024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/networking/switch-port-settings
25432024-10-09T22:52:12.573ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/switch-port-settings
25442024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/networking/switch-port-settings
25452024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/networking/switch-port-settings/{port}
25462024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/policy
25472024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/policy
25482024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/roles
25492024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/roles/{role_name}
25502024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silo-quotas
25512024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silos
25522024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/system/silos
25532024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/system/silos/{silo}
25542024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silos/{silo}
25552024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silos/{silo}/ip-pools
25562024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silos/{silo}/policy
25572024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/silos/{silo}/policy
25582024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/silos/{silo}/quotas
25592024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/silos/{silo}/quotas
25602024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/system/update/repository
25612024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/update/repository/{system_version}
25622024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/users
25632024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/users/{user_id}
25642024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/users-builtin
25652024-10-09T22:52:12.574ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/users-builtin/{user}
25662024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/utilization/silos
25672024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/system/utilization/silos/{silo}
25682024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/timeseries/query
25692024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/timeseries/schema
25702024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/users
25712024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/utilization
25722024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-firewall-rules
25732024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/vpc-firewall-rules
25742024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-router-routes
25752024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/vpc-router-routes
25762024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/vpc-router-routes/{route}
25772024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-router-routes/{route}
25782024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/vpc-router-routes/{route}
25792024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-routers
25802024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/vpc-routers
25812024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/vpc-routers/{router}
25822024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-routers/{router}
25832024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/vpc-routers/{router}
25842024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-subnets
25852024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/vpc-subnets
25862024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/vpc-subnets/{subnet}
25872024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-subnets/{subnet}
25882024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/vpc-subnets/{subnet}
25892024-10-09T22:52:12.575ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces
25902024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpcs
25912024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = POST path = /v1/vpcs
25922024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = DELETE path = /v1/vpcs/{vpc}
25932024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = GET path = /v1/vpcs/{vpc}
25942024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): registered endpoint local_addr = 127.0.0.1:37500 method = PUT path = /v1/vpcs/{vpc}
25952024-10-09T22:52:12.576ZINFOtest_unauthorized (dropshot_external): listening local_addr = 127.0.0.1:37500
25962024-10-09T22:52:12.576ZDEBGtest_unauthorized (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:37500
25972024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /
25982024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /access
25992024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /assets/{path}
26002024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /device/auth
26012024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /device/confirm
26022024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /device/success
26032024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /device/token
26042024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /device/verify
26052024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /experimental/v1/probes
26062024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /experimental/v1/probes
26072024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /experimental/v1/probes/{probe}
26082024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /experimental/v1/probes/{probe}
26092024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /images
26102024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /login
26112024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /login/{silo_name}/local
26122024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /login/{silo_name}/saml/{provider_name}
26132024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /login/{silo_name}/saml/{provider_name}
26142024-10-09T22:52:12.649ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect
26152024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /lookup/{path}
26162024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /projects/{path}
26172024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /projects-new
26182024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /settings/{path}
26192024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /system/{path}
26202024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /utilization
26212024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/certificates
26222024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/certificates
26232024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/certificates/{certificate}
26242024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/certificates/{certificate}
26252024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/disks
26262024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/disks
26272024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/disks/{disk}
26282024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/disks/{disk}
26292024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/disks/{disk}/bulk-write
26302024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/disks/{disk}/bulk-write-start
26312024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/disks/{disk}/bulk-write-stop
26322024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/disks/{disk}/finalize
26332024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/disks/{disk}/metrics/{metric}
26342024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/floating-ips
26352024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/floating-ips
26362024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/floating-ips/{floating_ip}
26372024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/floating-ips/{floating_ip}
26382024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/floating-ips/{floating_ip}
26392024-10-09T22:52:12.650ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/floating-ips/{floating_ip}/attach
26402024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/floating-ips/{floating_ip}/detach
26412024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/groups
26422024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/groups/{group_id}
26432024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/images
26442024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/images
26452024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/images/{image}
26462024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/images/{image}
26472024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/images/{image}/demote
26482024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/images/{image}/promote
26492024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances
26502024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances
26512024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/instances/{instance}
26522024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}
26532024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/instances/{instance}
26542024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}/disks
26552024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/disks/attach
26562024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/disks/detach
26572024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}/external-ips
26582024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral
26592024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/external-ips/ephemeral
26602024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/reboot
26612024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}/serial-console
26622024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}/serial-console/stream
26632024-10-09T22:52:12.651ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/instances/{instance}/ssh-public-keys
26642024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/start
26652024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/instances/{instance}/stop
26662024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/internet-gateway-ip-addresses
26672024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/internet-gateway-ip-addresses
26682024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/internet-gateway-ip-addresses/{address}
26692024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/internet-gateway-ip-pools
26702024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/internet-gateway-ip-pools
26712024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/internet-gateway-ip-pools/{pool}
26722024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/internet-gateways
26732024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/internet-gateways
26742024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/internet-gateways/{gateway}
26752024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/internet-gateways/{gateway}
26762024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/ip-pools
26772024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/ip-pools/{pool}
26782024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/login/{silo_name}/local
26792024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/logout
26802024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/me
26812024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/me/groups
26822024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/me/ssh-keys
26832024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/me/ssh-keys
26842024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/me/ssh-keys/{ssh_key}
26852024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/me/ssh-keys/{ssh_key}
26862024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/metrics/{metric_name}
26872024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/network-interfaces
26882024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/network-interfaces
26892024-10-09T22:52:12.652ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/network-interfaces/{interface}
26902024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/network-interfaces/{interface}
26912024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/network-interfaces/{interface}
26922024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/ping
26932024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/policy
26942024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/policy
26952024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/projects
26962024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/projects
26972024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/projects/{project}
26982024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/projects/{project}
26992024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/projects/{project}
27002024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/projects/{project}/policy
27012024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/projects/{project}/policy
27022024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/snapshots
27032024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/snapshots
27042024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/snapshots/{snapshot}
27052024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/snapshots/{snapshot}
27062024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/disks
27072024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/disks/{disk_id}
27082024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/racks
27092024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/racks/{rack_id}
27102024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/sleds
27112024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/hardware/sleds
27122024-10-09T22:52:12.653ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/sleds/{sled_id}
27132024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks
27142024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances
27152024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy
27162024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/sleds-uninitialized
27172024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/switch-port
27182024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings
27192024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/hardware/switch-port/{port}/settings
27202024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/switch-port/{port}/status
27212024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/switches
27222024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/hardware/switches/{switch_id}
27232024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/identity-providers
27242024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/identity-providers/local/users
27252024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/identity-providers/local/users/{user_id}
27262024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password
27272024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/identity-providers/saml
27282024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/identity-providers/saml/{provider}
27292024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools
27302024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools
27312024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/ip-pools/{pool}
27322024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools/{pool}
27332024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/ip-pools/{pool}
27342024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools/{pool}/ranges
27352024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools/{pool}/ranges/add
27362024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove
27372024-10-09T22:52:12.654ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools/{pool}/silos
27382024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools/{pool}/silos
27392024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo}
27402024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo}
27412024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools/{pool}/utilization
27422024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools-service
27432024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/ip-pools-service/ranges
27442024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools-service/ranges/add
27452024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/ip-pools-service/ranges/remove
27462024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/metrics/{metric_name}
27472024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/address-lot
27482024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/address-lot
27492024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/networking/address-lot/{address_lot}
27502024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks
27512024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/allow-list
27522024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/networking/allow-list
27532024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/bfd-disable
27542024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/bfd-enable
27552024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bfd-status
27562024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/networking/bgp
27572024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp
27582024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/bgp
27592024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-announce-set
27602024-10-09T22:52:12.655ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/networking/bgp-announce-set
27612024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set}
27622024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
27632024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-exported
27642024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-message-history
27652024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-routes-ipv4
27662024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/bgp-status
27672024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/loopback-address
27682024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/loopback-address
27692024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
27702024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/networking/switch-port-settings
27712024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/switch-port-settings
27722024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/networking/switch-port-settings
27732024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/networking/switch-port-settings/{port}
27742024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/policy
27752024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/policy
27762024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/roles
27772024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/roles/{role_name}
27782024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silo-quotas
27792024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silos
27802024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/system/silos
27812024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/system/silos/{silo}
27822024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silos/{silo}
27832024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silos/{silo}/ip-pools
27842024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silos/{silo}/policy
27852024-10-09T22:52:12.656ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/silos/{silo}/policy
27862024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/silos/{silo}/quotas
27872024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/silos/{silo}/quotas
27882024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/system/update/repository
27892024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/update/repository/{system_version}
27902024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/users
27912024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/users/{user_id}
27922024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/users-builtin
27932024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/users-builtin/{user}
27942024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/utilization/silos
27952024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/system/utilization/silos/{silo}
27962024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/timeseries/query
27972024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/timeseries/schema
27982024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/users
27992024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/utilization
28002024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-firewall-rules
28012024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/vpc-firewall-rules
28022024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-router-routes
28032024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/vpc-router-routes
28042024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/vpc-router-routes/{route}
28052024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-router-routes/{route}
28062024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/vpc-router-routes/{route}
28072024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-routers
28082024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/vpc-routers
28092024-10-09T22:52:12.657ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/vpc-routers/{router}
28102024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-routers/{router}
28112024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/vpc-routers/{router}
28122024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-subnets
28132024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/vpc-subnets
28142024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/vpc-subnets/{subnet}
28152024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-subnets/{subnet}
28162024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/vpc-subnets/{subnet}
28172024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces
28182024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpcs
28192024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = POST path = /v1/vpcs
28202024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = DELETE path = /v1/vpcs/{vpc}
28212024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = GET path = /v1/vpcs/{vpc}
28222024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:63615 method = PUT path = /v1/vpcs/{vpc}
28232024-10-09T22:52:12.658ZINFOtest_unauthorized (dropshot_external_techport): listening local_addr = 127.0.0.1:63615
28242024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:63615
28252024-10-09T22:52:12.658ZDEBGtest_unauthorized (nexus-producer-server): registered DTrace probes
28262024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = 127.0.0.1:35710 method = GET path = /{producer_id}
28272024-10-09T22:52:12.658ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197 local_addr = 127.0.0.1:35710
28282024-10-09T22:52:12.658ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:35710
28292024-10-09T22:52:12.658ZDEBGtest_unauthorized (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:35710
28302024-10-09T22:52:12.658ZDEBGtest_unauthorized (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:58302
28312024-10-09T22:52:12.658ZDEBGtest_unauthorized (nexus-producer-server): starting producer registration task
28322024-10-09T22:52:12.658ZINFOtest_unauthorized (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:35710 file = oximeter/producer/src/lib.rs:283 interval = 10s producer_id = 3173ad92-59fe-4065-97ff-35fc539b0d16
28332024-10-09T22:52:12.658ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28342024-10-09T22:52:12.658ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
28352024-10-09T22:52:12.658ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28362024-10-09T22:52:12.659ZDEBGtest_unauthorized (producer-registration-task): registering / renewing oximeter producer lease with Nexus
28372024-10-09T22:52:12.659ZDEBGtest_unauthorized (producer-registration-task): using nexus address for registration addr = 127.0.0.1:58302
28382024-10-09T22:52:12.746ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:58302/metrics/producers
28392024-10-09T22:52:12.748ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:34394
28402024-10-09T22:52:12.750ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5a652d07-eb69-432f-b7e7-299d868a10bb", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28412024-10-09T22:52:12.750ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/stage0/caboose?firmware_slot=0
28422024-10-09T22:52:12.750ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:34394 req_id = b25efc4b-b91e-4c1d-91fc-95fb48e408f5 uri = /metrics/producers
28432024-10-09T22:52:12.751ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:34394 req_id = b25efc4b-b91e-4c1d-91fc-95fb48e408f5 resource = Database uri = /metrics/producers
28442024-10-09T22:52:12.751ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:34394 req_id = b25efc4b-b91e-4c1d-91fc-95fb48e408f5 roles = RoleSet { roles: {} } uri = /metrics/producers
28452024-10-09T22:52:12.752ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:34394 req_id = b25efc4b-b91e-4c1d-91fc-95fb48e408f5 resource = Database result = Ok(()) uri = /metrics/producers
28462024-10-09T22:52:12.752ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
28472024-10-09T22:52:12.753ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28482024-10-09T22:52:12.753ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28492024-10-09T22:52:12.753ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
28502024-10-09T22:52:12.753ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28512024-10-09T22:52:12.756ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "533a13ce-8adb-4a7e-8064-6fd7bf9caced", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28522024-10-09T22:52:12.756ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/stage0/caboose?firmware_slot=1
28532024-10-09T22:52:12.756ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28542024-10-09T22:52:12.762ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) } result = Ok(())
28552024-10-09T22:52:12.762ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) }
28562024-10-09T22:52:12.762ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28572024-10-09T22:52:12.762ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28582024-10-09T22:52:12.762ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
28592024-10-09T22:52:12.763ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28602024-10-09T22:52:12.766ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28612024-10-09T22:52:12.775ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: 039be560-54cc-49e3-88df-1a29dadbf913, lookup_type: ById(039be560-54cc-49e3-88df-1a29dadbf913) } result = Ok(())
28622024-10-09T22:52:12.775ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
28632024-10-09T22:52:12.775ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
28642024-10-09T22:52:12.780ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
28652024-10-09T22:52:12.785ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d87b7ea1-6873-42f6-ba40-a6e9eacf07ce", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28662024-10-09T22:52:12.786ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/cmpa
28672024-10-09T22:52:12.787ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8dfa94f5-bbd1-4925-b4ab-97555596c05d", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28682024-10-09T22:52:12.788ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/cfpa
28692024-10-09T22:52:12.796ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "98c20d88-bec2-4ea2-9d24-c34b339ecfb4", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28702024-10-09T22:52:12.796ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/cfpa
28712024-10-09T22:52:12.802ZDEBGtest_unauthorized (init_with_steps): Running step start_oximeter
28722024-10-09T22:52:12.802ZDEBGtest_unauthorized: Starting Oximeter
28732024-10-09T22:52:12.804ZDEBGtest_unauthorized (oximeter): registered DTrace probes
28742024-10-09T22:52:12.804ZINFOtest_unauthorized (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:203
28752024-10-09T22:52:12.804ZINFOtest_unauthorized (DnsResolver): new DNS resolver addresses = [[::1:0:0:0:1]:53, [::2:0:0:0:1]:53, [::3:0:0:0:1]:53] file = internal-dns/src/resolver.rs:72
28762024-10-09T22:52:12.804ZDEBGtest_unauthorized (oximeter): creating ClickHouse client
28772024-10-09T22:52:12.928ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = SELECT MAX(value) FROM oximeter.version;
28782024-10-09T22:52:12.929ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5954e10b-80ec-4ec6-8ba5-f57f21ab5c3d", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:11 GMT"} })
28792024-10-09T22:52:12.929ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/0/component/rot/cfpa
28802024-10-09T22:52:12.930ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 179359 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:34394 req_id = b25efc4b-b91e-4c1d-91fc-95fb48e408f5 response_code = 503 uri = /metrics/producers
28812024-10-09T22:52:12.931ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:58302/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "b25efc4b-b91e-4c1d-91fc-95fb48e408f5", "content-length": "133", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28822024-10-09T22:52:12.933ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 214.811508ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"b25efc4b-b91e-4c1d-91fc-95fb48e408f5\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:52:12 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"b25efc4b-b91e-4c1d-91fc-95fb48e408f5\\" }" file = oximeter/producer/src/lib.rs:424
28832024-10-09T22:52:12.935ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fc1dc79d-e3ee-41b9-beaf-11cbc9421d5c", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28842024-10-09T22:52:12.935ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1
28852024-10-09T22:52:12.936ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "994a192b-e330-4263-a760-28ad0b200e64", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28862024-10-09T22:52:12.937ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/sp/caboose?firmware_slot=0
28872024-10-09T22:52:12.939ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f3ddc2cf-bfa1-407e-80a5-667c961d17de", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28882024-10-09T22:52:12.939ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/sp/caboose?firmware_slot=1
28892024-10-09T22:52:12.942ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "87b88474-c5f8-4b72-b8d7-734aa34be4ce", "content-length": "109", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28902024-10-09T22:52:12.942ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/caboose?firmware_slot=0
28912024-10-09T22:52:12.944ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "20d8c93c-57c6-437a-97a4-45ebd5b3659f", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28922024-10-09T22:52:12.944ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/caboose?firmware_slot=1
28932024-10-09T22:52:12.946ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:731 id = b53557d6-d079-4bb7-a199-56c26395bcc9
28942024-10-09T22:52:12.946ZDEBGtest_unauthorized (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
28952024-10-09T22:52:12.946ZINFOtest_unauthorized (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:669 id = b53557d6-d079-4bb7-a199-56c26395bcc9
28962024-10-09T22:52:12.946ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = SELECT MAX(value) FROM oximeter.version;
28972024-10-09T22:52:12.947ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f697d6ba-681b-4dd5-9097-89c90ea34d5d", "content-length": "169", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
28982024-10-09T22:52:12.947ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/stage0/caboose?firmware_slot=0
28992024-10-09T22:52:12.948ZWARNtest_unauthorized (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:731 id = b53557d6-d079-4bb7-a199-56c26395bcc9
29002024-10-09T22:52:12.948ZINFOtest_unauthorized (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:673 id = b53557d6-d079-4bb7-a199-56c26395bcc9 version = 0
29012024-10-09T22:52:12.948ZINFOtest_unauthorized (clickhouse-client): wiping and re-initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:678 id = b53557d6-d079-4bb7-a199-56c26395bcc9
29022024-10-09T22:52:12.948ZDEBGtest_unauthorized (clickhouse-client): wiping ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9
29032024-10-09T22:52:12.948ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = DROP DATABASE IF EXISTS oximeter
29042024-10-09T22:52:12.949ZDEBGtest_unauthorized (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9
29052024-10-09T22:52:12.949ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = CREATE DATABASE IF NOT EXISTS oximeter
29062024-10-09T22:52:12.950ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f1a2f3c5-f910-48ad-91ff-d6f628998641", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29072024-10-09T22:52:12.950ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/stage0/caboose?firmware_slot=1
29082024-10-09T22:52:12.952ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "540f366f-2ae6-46fd-8ec0-8fa209e30de5", "content-length": "178", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29092024-10-09T22:52:12.952ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/cmpa
29102024-10-09T22:52:12.952ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
29112024-10-09T22:52:12.953ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "db7b1c9d-75cb-4f19-a84f-a708bc5d1206", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29122024-10-09T22:52:12.953ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/cfpa
29132024-10-09T22:52:12.971ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29142024-10-09T22:52:12.972ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ef7f17a1-37a8-4f4c-a0bc-17bdf8a5d789", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29152024-10-09T22:52:12.972ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/cfpa
29162024-10-09T22:52:12.974ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ad5ba1b3-0216-4427-ae2b-51813d1d24cb", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29172024-10-09T22:52:12.974ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/sled/1/component/rot/cfpa
29182024-10-09T22:52:12.976ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0078bdb6-22eb-4190-ab28-24e001f305cb", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29192024-10-09T22:52:12.976ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39308
29202024-10-09T22:52:12.976ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39308 method = GET uri = http://[::1]:39308/ignition
29212024-10-09T22:52:12.978ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39308 result = Ok(Response { url: "http://[::1]:39308/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "c1824021-3522-41a5-9079-e9e0930c4315", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29222024-10-09T22:52:12.978ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39308 method = GET uri = http://[::1]:39308/sp/switch/0
29232024-10-09T22:52:12.978ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29242024-10-09T22:52:12.979ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39308 result = Ok(Response { url: "http://[::1]:39308/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "406947c3-37a4-4b3e-8190-93bb4e94ab31", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29252024-10-09T22:52:12.979ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39308 method = GET uri = http://[::1]:39308/sp/switch/1
29262024-10-09T22:52:12.980ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39308 result = Ok(Response { url: "http://[::1]:39308/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7b4e1888-c212-4ff6-8667-b829c0f6d10c", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29272024-10-09T22:52:12.980ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39308 method = GET uri = http://[::1]:39308/sp/sled/0
29282024-10-09T22:52:12.981ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39308 result = Ok(Response { url: "http://[::1]:39308/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1f7b3033-e71a-475e-b9bd-61e50a05277a", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29292024-10-09T22:52:12.982ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39308 method = GET uri = http://[::1]:39308/sp/sled/1
29302024-10-09T22:52:12.983ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39308 result = Ok(Response { url: "http://[::1]:39308/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b58b4cf0-0ef6-4492-b9ab-0fa62e525d35", "content-length": "723", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29312024-10-09T22:52:12.988ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
29322024-10-09T22:52:12.988ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29332024-10-09T22:52:12.988ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29342024-10-09T22:52:12.988ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29352024-10-09T22:52:12.988ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29362024-10-09T22:52:12.990ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29372024-10-09T22:52:12.992ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29382024-10-09T22:52:12.997ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29392024-10-09T22:52:12.997ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
29402024-10-09T22:52:12.997ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29412024-10-09T22:52:12.997ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29422024-10-09T22:52:12.997ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29432024-10-09T22:52:12.998ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29442024-10-09T22:52:12.999ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29452024-10-09T22:52:13.000ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29462024-10-09T22:52:13.008ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29472024-10-09T22:52:13.008ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29482024-10-09T22:52:13.008ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29492024-10-09T22:52:13.008ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29502024-10-09T22:52:13.010ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29512024-10-09T22:52:13.095ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:50881
29522024-10-09T22:52:13.095ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:50881 background_task = inventory_collection body = None method = GET uri = http://[::1]:50881/inventory
29532024-10-09T22:52:13.096ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:50881 remote_addr = [::1]:60184 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913
29542024-10-09T22:52:13.097ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29552024-10-09T22:52:13.098ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:50881 method = GET remote_addr = [::1]:60184 req_id = b2060862-08c3-4896-ba0d-be9c6aabad05 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /inventory
29562024-10-09T22:52:13.098ZINFOtest_unauthorized (dropshot): request completed latency_us = 816 local_addr = [::1]:50881 method = GET remote_addr = [::1]:60184 req_id = b2060862-08c3-4896-ba0d-be9c6aabad05 response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /inventory
29572024-10-09T22:52:13.099ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:50881 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:50881/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "b2060862-08c3-4896-ba0d-be9c6aabad05", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29582024-10-09T22:52:13.100ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:50881 background_task = inventory_collection body = None method = GET uri = http://[::1]:50881/omicron-zones
29592024-10-09T22:52:13.101ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:50881 method = GET remote_addr = [::1]:60184 req_id = 026e146c-1274-438d-8ece-55df02f96e2a sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
29602024-10-09T22:52:13.101ZINFOtest_unauthorized (dropshot): request completed latency_us = 249 local_addr = [::1]:50881 method = GET remote_addr = [::1]:60184 req_id = 026e146c-1274-438d-8ece-55df02f96e2a response_code = 200 sled_id = 039be560-54cc-49e3-88df-1a29dadbf913 uri = /omicron-zones
29612024-10-09T22:52:13.104ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:50881 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:50881/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "026e146c-1274-438d-8ece-55df02f96e2a", "content-length": "27", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29622024-10-09T22:52:13.183ZDEBGtest_unauthorized (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:36561
29632024-10-09T22:52:13.183ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:36561 background_task = inventory_collection body = None method = GET uri = http://[::1]:36561/inventory
29642024-10-09T22:52:13.184ZINFOtest_unauthorized (dropshot): accepted connection local_addr = [::1]:36561 remote_addr = [::1]:43742 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29652024-10-09T22:52:13.257ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:58302/metrics/producers
29662024-10-09T22:52:13.258ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29672024-10-09T22:52:13.258ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:36415
29682024-10-09T22:52:13.258ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = GET remote_addr = [::1]:43742 req_id = c9e83ce3-87c6-4036-a9bb-db78053f0706 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29692024-10-09T22:52:13.263ZINFOtest_unauthorized (dropshot): request completed latency_us = 5223 local_addr = [::1]:36561 method = GET remote_addr = [::1]:43742 req_id = c9e83ce3-87c6-4036-a9bb-db78053f0706 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29702024-10-09T22:52:13.265ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:36415 req_id = f1dc4adc-a397-4e23-b956-112747edc518 uri = /metrics/producers
29712024-10-09T22:52:13.265ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:36561 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:36561/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "c9e83ce3-87c6-4036-a9bb-db78053f0706", "content-length": "4155", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29722024-10-09T22:52:13.265ZDEBGtest_unauthorized (BackgroundTasks): client request SledAgent = http://[::1]:36561 background_task = inventory_collection body = None method = GET uri = http://[::1]:36561/omicron-zones
29732024-10-09T22:52:13.266ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:36415 req_id = f1dc4adc-a397-4e23-b956-112747edc518 resource = Database uri = /metrics/producers
29742024-10-09T22:52:13.266ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:36415 req_id = f1dc4adc-a397-4e23-b956-112747edc518 roles = RoleSet { roles: {} } uri = /metrics/producers
29752024-10-09T22:52:13.267ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:36415 req_id = f1dc4adc-a397-4e23-b956-112747edc518 resource = Database result = Ok(()) uri = /metrics/producers
29762024-10-09T22:52:13.268ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36561 method = GET remote_addr = [::1]:43742 req_id = 7ac330e9-5809-4bd6-ae53-f2506f4d113b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
29772024-10-09T22:52:13.271ZINFOtest_unauthorized (dropshot): request completed latency_us = 3076 local_addr = [::1]:36561 method = GET remote_addr = [::1]:43742 req_id = 7ac330e9-5809-4bd6-ae53-f2506f4d113b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
29782024-10-09T22:52:13.271ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29792024-10-09T22:52:13.273ZDEBGtest_unauthorized (BackgroundTasks): client response SledAgent = http://[::1]:36561 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:36561/omicron-zones", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ac330e9-5809-4bd6-ae53-f2506f4d113b", "content-length": "2268", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29802024-10-09T22:52:13.275ZDEBGtest_unauthorized (BackgroundTasks): finished collection background_task = inventory_collection
29812024-10-09T22:52:13.275ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
29822024-10-09T22:52:13.275ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29832024-10-09T22:52:13.276ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29842024-10-09T22:52:13.276ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29852024-10-09T22:52:13.276ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29862024-10-09T22:52:13.299ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29872024-10-09T22:52:13.304ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
29882024-10-09T22:52:13.308ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
29892024-10-09T22:52:13.308ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29902024-10-09T22:52:13.308ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
29912024-10-09T22:52:13.309ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29922024-10-09T22:52:13.326ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 61026 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:36415 req_id = f1dc4adc-a397-4e23-b956-112747edc518 response_code = 503 uri = /metrics/producers
29932024-10-09T22:52:13.333ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:58302/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "f1dc4adc-a397-4e23-b956-112747edc518", "content-length": "133", "date": "Wed, 09 Oct 2024 22:52:12 GMT"} })
29942024-10-09T22:52:13.336ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 598.131916ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"f1dc4adc-a397-4e23-b956-112747edc518\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:52:12 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"f1dc4adc-a397-4e23-b956-112747edc518\\" }" file = oximeter/producer/src/lib.rs:424
29952024-10-09T22:52:13.338ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29962024-10-09T22:52:13.350ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29972024-10-09T22:52:13.368ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29982024-10-09T22:52:13.473ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29992024-10-09T22:52:13.480ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30002024-10-09T22:52:13.487ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30012024-10-09T22:52:13.493ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30022024-10-09T22:52:13.502ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30032024-10-09T22:52:13.510ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30042024-10-09T22:52:13.519ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30052024-10-09T22:52:13.526ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30062024-10-09T22:52:13.539ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30072024-10-09T22:52:13.548ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30082024-10-09T22:52:13.556ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30092024-10-09T22:52:13.569ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30102024-10-09T22:52:13.581ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30112024-10-09T22:52:13.587ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30122024-10-09T22:52:13.599ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
30132024-10-09T22:52:13.606ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30142024-10-09T22:52:13.622ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30152024-10-09T22:52:13.637ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30162024-10-09T22:52:13.709ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30172024-10-09T22:52:13.749ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30182024-10-09T22:52:13.814ZINFOtest_unauthorized (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = a0b3a524-9094-4bb1-b55e-140582744912
30192024-10-09T22:52:13.814ZDEBGtest_unauthorized (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = a0b3a524-9094-4bb1-b55e-140582744912 time_started = 2024-10-09 22:52:11.697589 UTC
30202024-10-09T22:52:13.814ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.950903012s iteration = 4 status = {"collection_id":"a0b3a524-9094-4bb1-b55e-140582744912","time_done":"2024-10-09 22:52:13.275883 UTC","time_started":"2024-10-09 22:52:11.697589 UTC"}
30212024-10-09T22:52:13.814ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
30222024-10-09T22:52:13.814ZDEBGtest_unauthorized (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 16.519\u{b5}s iteration = 2 status = {"error":"task disabled"}
30232024-10-09T22:52:13.815ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30242024-10-09T22:52:13.855ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30252024-10-09T22:52:13.880ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30262024-10-09T22:52:13.902ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30272024-10-09T22:52:14.086ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:58302/metrics/producers
30282024-10-09T22:52:14.087ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:62973
30292024-10-09T22:52:14.087ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30302024-10-09T22:52:14.087ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:62973 req_id = e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5 uri = /metrics/producers
30312024-10-09T22:52:14.088ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:62973 req_id = e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5 resource = Database uri = /metrics/producers
30322024-10-09T22:52:14.088ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:62973 req_id = e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5 roles = RoleSet { roles: {} } uri = /metrics/producers
30332024-10-09T22:52:14.098ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:62973 req_id = e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5 resource = Database result = Ok(()) uri = /metrics/producers
30342024-10-09T22:52:14.105ZINFOtest_unauthorized (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 17059 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:62973 req_id = e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5 response_code = 503 uri = /metrics/producers
30352024-10-09T22:52:14.105ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:58302/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5", "content-length": "133", "date": "Wed, 09 Oct 2024 22:52:14 GMT"} })
30362024-10-09T22:52:14.107ZWARNtest_unauthorized (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 639.747567ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 09 Oct 2024 22:52:14 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"e73f8f5f-4cc1-4aea-aa46-9f7731bbdff5\\" }" file = oximeter/producer/src/lib.rs:424
30372024-10-09T22:52:14.151ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30382024-10-09T22:52:14.190ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
30392024-10-09T22:52:14.206ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
30402024-10-09T22:52:14.233ZINFOtest_unauthorized (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:701 id = b53557d6-d079-4bb7-a199-56c26395bcc9 version = 12
30412024-10-09T22:52:14.233ZTRACtest_unauthorized (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = b53557d6-d079-4bb7-a199-56c26395bcc9 sql = INSERT INTO oximeter.version (*) VALUES (12, now());
30422024-10-09T22:52:14.249ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36225 method = GET path = /info
30432024-10-09T22:52:14.249ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36225 method = GET path = /producers
30442024-10-09T22:52:14.249ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36225 method = POST path = /producers
30452024-10-09T22:52:14.249ZDEBGtest_unauthorized (dropshot): registered endpoint local_addr = [::1]:36225 method = DELETE path = /producers/{producer_id}
30462024-10-09T22:52:14.249ZINFOtest_unauthorized (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:197 local_addr = [::1]:36225
30472024-10-09T22:52:14.250ZDEBGtest_unauthorized (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:36225
30482024-10-09T22:52:14.250ZDEBGtest_unauthorized (oximeter): contacting nexus
30492024-10-09T22:52:14.358ZDEBGtest_unauthorized (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:58302/metrics/collectors
30502024-10-09T22:52:14.360ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:37649
30512024-10-09T22:52:14.361ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:37649 req_id = 6a1da400-f3c5-437e-b039-53962b9b0ab9 uri = /metrics/collectors
30522024-10-09T22:52:14.369ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:37649 req_id = 6a1da400-f3c5-437e-b039-53962b9b0ab9 resource = Database uri = /metrics/collectors
30532024-10-09T22:52:14.369ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:37649 req_id = 6a1da400-f3c5-437e-b039-53962b9b0ab9 roles = RoleSet { roles: {} } uri = /metrics/collectors
30542024-10-09T22:52:14.370ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:37649 req_id = 6a1da400-f3c5-437e-b039-53962b9b0ab9 resource = Database result = Ok(()) uri = /metrics/collectors
30552024-10-09T22:52:14.375ZINFOtest_unauthorized (nexus): registered new oximeter metric collection server address = [::1]:36225 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30562024-10-09T22:52:14.375ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 14219 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:37649 req_id = 6a1da400-f3c5-437e-b039-53962b9b0ab9 response_code = 204 uri = /metrics/collectors
30572024-10-09T22:52:14.375ZDEBGtest_unauthorized (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:58302/metrics/collectors", status: 204, headers: {"x-request-id": "6a1da400-f3c5-437e-b039-53962b9b0ab9", "date": "Wed, 09 Oct 2024 22:52:14 GMT"} })
30582024-10-09T22:52:14.393ZINFOtest_unauthorized (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:312 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30592024-10-09T22:52:14.394ZDEBGtest_unauthorized (init_with_steps): Running step start_producer_server
30602024-10-09T22:52:14.394ZDEBGtest_unauthorized: Starting test metric Producer Server
30612024-10-09T22:52:14.412ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = GET path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30622024-10-09T22:52:14.414ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = POST path = /crucible/0/regions server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30632024-10-09T22:52:14.414ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = DELETE path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30642024-10-09T22:52:14.415ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = GET path = /crucible/0/regions/{id} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30652024-10-09T22:52:14.416ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = GET path = /crucible/0/regions/{id}/snapshots server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30662024-10-09T22:52:14.419ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30672024-10-09T22:52:14.419ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = GET path = /crucible/0/regions/{id}/snapshots/{name} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30682024-10-09T22:52:14.419ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = DELETE path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30692024-10-09T22:52:14.419ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): registered endpoint kind = storage local_addr = [::1]:40482 method = POST path = /crucible/0/regions/{id}/snapshots/{name}/run server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30702024-10-09T22:52:14.419ZINFOtest_unauthorized (Simulated CrucibleAgent Dropshot Server): listening kind = storage local_addr = [::1]:40482 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30712024-10-09T22:52:14.420ZDEBGtest_unauthorized (Simulated CrucibleAgent Dropshot Server): successfully registered DTrace USDT probes kind = storage local_addr = [::1]:40482 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30722024-10-09T22:52:14.420ZINFOtest_unauthorized (SledAgent): Created Simulated Crucible Server address = [::1]:40482 kind = storage server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30732024-10-09T22:52:14.420ZINFOtest_unauthorized (nexus): upserting physical disk model = test-model physical_disk_id = 7436e4f7-a48e-4c5d-ad32-73142b7783ad serial = totally-unique-serial: 7436e4f7-a48e-4c5d-ad32-73142b7783ad sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vendor = test-vendor
30742024-10-09T22:52:14.420ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30752024-10-09T22:52:14.420ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30762024-10-09T22:52:14.421ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30772024-10-09T22:52:14.563ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:52875
30782024-10-09T22:52:14.564ZINFOtest_unauthorized (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:770
30792024-10-09T22:52:14.564ZTRACtest_unauthorized (DnsResolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
30802024-10-09T22:52:14.565ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
30812024-10-09T22:52:14.565ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30822024-10-09T22:52:14.565ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30832024-10-09T22:52:14.565ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30842024-10-09T22:52:14.566ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30852024-10-09T22:52:14.567ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:52875 req_id = 5cf3d0c5-ea39-4e9a-83dc-bf913abd5039 uri = /metrics/producers
30862024-10-09T22:52:14.567ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:52875 req_id = 5cf3d0c5-ea39-4e9a-83dc-bf913abd5039 resource = Database uri = /metrics/producers
30872024-10-09T22:52:14.567ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:52875 req_id = 5cf3d0c5-ea39-4e9a-83dc-bf913abd5039 roles = RoleSet { roles: {} } uri = /metrics/producers
30882024-10-09T22:52:14.568ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:52875 req_id = 5cf3d0c5-ea39-4e9a-83dc-bf913abd5039 resource = Database result = Ok(()) uri = /metrics/producers
30892024-10-09T22:52:14.570ZWARNtest_unauthorized (oximeter-agent): failed to lookup Nexus IP, will retry collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 delay = 170.291421ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/collector/src/agent.rs:834
30902024-10-09T22:52:14.571ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30912024-10-09T22:52:14.576ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
30922024-10-09T22:52:14.762ZINFOtest_unauthorized (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
30932024-10-09T22:52:14.771ZDEBGtest_unauthorized (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:36225/producers
30942024-10-09T22:52:14.771ZINFOtest_unauthorized (nexus): upserting zpool physical_disk_id = 7436e4f7-a48e-4c5d-ad32-73142b7783ad sled_id = b6d65341-167c-41df-9b5c-41cded99c229 zpool_id = 38248358-bc03-4bbe-b919-9629bad38047
30952024-10-09T22:52:14.771ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
30962024-10-09T22:52:14.772ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
30972024-10-09T22:52:14.772ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
30982024-10-09T22:52:14.772ZINFOtest_unauthorized (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105 local_addr = [::1]:36225 remote_addr = [::1]:42797
30992024-10-09T22:52:14.772ZTRACtest_unauthorized (DnsResolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
31002024-10-09T22:52:14.873ZDEBGtest_unauthorized (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:58302/metrics/producers
31012024-10-09T22:52:14.875ZTRACtest_unauthorized (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
31022024-10-09T22:52:14.875ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31032024-10-09T22:52:14.875ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31042024-10-09T22:52:14.875ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31052024-10-09T22:52:14.876ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31062024-10-09T22:52:14.876ZINFOtest_unauthorized (dropshot_internal): accepted connection local_addr = 127.0.0.1:58302 remote_addr = 127.0.0.1:53021
31072024-10-09T22:52:14.877ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36225 method = POST remote_addr = [::1]:42797 req_id = 0443dd7a-90a1-433a-a071-5c7ff9f3e4a7 uri = /producers
31082024-10-09T22:52:14.878ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = [::1]:64148 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31092024-10-09T22:52:14.878ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950 latency_us = 1650 local_addr = [::1]:36225 method = POST remote_addr = [::1]:42797 req_id = 0443dd7a-90a1-433a-a071-5c7ff9f3e4a7 response_code = 204 uri = /producers
31102024-10-09T22:52:14.988ZTRACtest_unauthorized (dropshot_internal): incoming request local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:53021 req_id = 062b08bf-2b4a-4ff5-9732-c37228f44c6a uri = /metrics/producers
31112024-10-09T22:52:14.988ZDEBGtest_unauthorized (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: "http://[::1]:36225/producers", status: 204, headers: {"x-request-id": "0443dd7a-90a1-433a-a071-5c7ff9f3e4a7", "date": "Wed, 09 Oct 2024 22:52:14 GMT"} })
31122024-10-09T22:52:14.989ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31132024-10-09T22:52:14.991ZTRACtest_unauthorized (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:53021 req_id = 062b08bf-2b4a-4ff5-9732-c37228f44c6a resource = Database uri = /metrics/producers
31142024-10-09T22:52:14.991ZDEBGtest_unauthorized (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:53021 req_id = 062b08bf-2b4a-4ff5-9732-c37228f44c6a roles = RoleSet { roles: {} } uri = /metrics/producers
31152024-10-09T22:52:14.992ZDEBGtest_unauthorized (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:53021 req_id = 062b08bf-2b4a-4ff5-9732-c37228f44c6a resource = Database result = Ok(()) uri = /metrics/producers
31162024-10-09T22:52:14.992ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 425291 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:52875 req_id = 5cf3d0c5-ea39-4e9a-83dc-bf913abd5039 response_code = 201 uri = /metrics/producers
31172024-10-09T22:52:14.992ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31182024-10-09T22:52:14.996ZDEBGtest_unauthorized (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
31192024-10-09T22:52:14.997ZWARNtest_unauthorized (oximeter-agent): failed to lookup Nexus IP, will retry collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 delay = 287.449948ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/collector/src/agent.rs:834
31202024-10-09T22:52:14.997ZDEBGtest_unauthorized (collection-task): starting oximeter collection task address = [::1]:64148 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 interval = 1s producer_id = a6458b7d-87c3-4483-be96-854d814c20de
31212024-10-09T22:52:15.104ZINFOtest_unauthorized (nexus): registered oximeter collector client id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
31222024-10-09T22:52:15.104ZDEBGtest_unauthorized (nexus): client request body = Some(Body) method = POST oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 uri = http://[::1]:36225/producers
31232024-10-09T22:52:15.105ZINFOtest_unauthorized (nexus): upserting dataset address = [::1]:40482 dataset_id = d01eb62e-99bd-4e40-a59f-8d080fb42fb7 zpool_id = 38248358-bc03-4bbe-b919-9629bad38047
31242024-10-09T22:52:15.105ZINFOtest_unauthorized (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:1105 local_addr = [::1]:36225 remote_addr = [::1]:50262
31252024-10-09T22:52:15.108ZTRACtest_unauthorized (dropshot): incoming request local_addr = [::1]:36225 method = POST remote_addr = [::1]:50262 req_id = 20576b27-a971-434b-b9d3-f7d518a3e2b0 uri = /producers
31262024-10-09T22:52:15.108ZDEBGtest_unauthorized (oximeter-agent): registered new metric producer address = 127.0.0.1:35710 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 3173ad92-59fe-4065-97ff-35fc539b0d16
31272024-10-09T22:52:15.108ZINFOtest_unauthorized (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.12.0/src/server.rs:950 latency_us = 556 local_addr = [::1]:36225 method = POST remote_addr = [::1]:50262 req_id = 20576b27-a971-434b-b9d3-f7d518a3e2b0 response_code = 204 uri = /producers
31282024-10-09T22:52:15.218ZDEBGtest_unauthorized (nexus): client response oximeter-collector = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 result = Ok(Response { url: "http://[::1]:36225/producers", status: 204, headers: {"x-request-id": "20576b27-a971-434b-b9d3-f7d518a3e2b0", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31292024-10-09T22:52:15.218ZINFOtest_unauthorized (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 3173ad92-59fe-4065-97ff-35fc539b0d16
31302024-10-09T22:52:15.220ZINFOtest_unauthorized (dropshot_internal): request completed latency_us = 232077 local_addr = 127.0.0.1:58302 method = POST remote_addr = 127.0.0.1:53021 req_id = 062b08bf-2b4a-4ff5-9732-c37228f44c6a response_code = 201 uri = /metrics/producers
31312024-10-09T22:52:15.224ZDEBGtest_unauthorized (collection-task): starting oximeter collection task address = 127.0.0.1:35710 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 interval = 10s producer_id = 3173ad92-59fe-4065-97ff-35fc539b0d16
31322024-10-09T22:52:15.224ZDEBGtest_unauthorized (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:58302/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "062b08bf-2b4a-4ff5-9732-c37228f44c6a", "content-length": "41", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31332024-10-09T22:52:15.227ZDEBGtest_unauthorized (producer-registration-task): registered with nexus successfully
31342024-10-09T22:52:15.227ZDEBGtest_unauthorized (producer-registration-task): pausing until time to renew lease lease_duration = 600s wait_period = 150s
31352024-10-09T22:52:15.287ZTRACtest_unauthorized (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory
31362024-10-09T22:52:15.287ZTRACtest_unauthorized (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31372024-10-09T22:52:15.287ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31382024-10-09T22:52:15.287ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31392024-10-09T22:52:15.288ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31402024-10-09T22:52:15.288ZTRACtest_unauthorized (DnsResolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
31412024-10-09T22:52:15.289ZDEBGtest_unauthorized (BackgroundTasks): activating background_task = inventory_collection iteration = 5 reason = Signaled
31422024-10-09T22:52:15.289ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
31432024-10-09T22:52:15.289ZTRACtest_unauthorized (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31442024-10-09T22:52:15.289ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
31452024-10-09T22:52:15.289ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
31462024-10-09T22:52:15.290ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
31472024-10-09T22:52:15.300ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31482024-10-09T22:52:15.312ZDEBGtest_unauthorized (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Inventory result = Ok(())
31492024-10-09T22:52:15.312ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31502024-10-09T22:52:15.312ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31512024-10-09T22:52:15.315ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31522024-10-09T22:52:15.316ZWARNtest_unauthorized (oximeter-agent): failed to lookup Nexus IP, will retry collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 delay = 511.6083ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/collector/src/agent.rs:834
31532024-10-09T22:52:15.324ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
31542024-10-09T22:52:15.333ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
31552024-10-09T22:52:15.333ZTRACtest_unauthorized (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
31562024-10-09T22:52:15.333ZDEBGtest_unauthorized (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
31572024-10-09T22:52:15.334ZDEBGtest_unauthorized (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
31582024-10-09T22:52:15.360ZDEBGtest_unauthorized (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(a0b3a524-9094-4bb1-b55e-140582744912, 0)]
31592024-10-09T22:52:15.360ZTRACtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
31602024-10-09T22:52:15.361ZTRACtest_unauthorized (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
31612024-10-09T22:52:15.361ZDEBGtest_unauthorized (InternalApi): roles roles = RoleSet { roles: {} }
31622024-10-09T22:52:15.363ZDEBGtest_unauthorized (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
31632024-10-09T22:52:15.364ZTRACtest_unauthorized (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
31642024-10-09T22:52:15.373ZTRACtest_unauthorized (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 33 23 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 3#..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:63671 req_id = 0cb1746a-7366-4655-a56d-1172609a9ba3
31652024-10-09T22:52:15.374ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 13091,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63671 req_id = 0cb1746a-7366-4655-a56d-1172609a9ba3
31662024-10-09T22:52:15.374ZDEBGtest_unauthorized (store): query key key = _mgs._tcp
31672024-10-09T22:52:15.375ZDEBGtest_unauthorized (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
31682024-10-09T22:52:15.377ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
31692024-10-09T22:52:15.377ZDEBGtest_unauthorized (dns): dns response additional_records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63671 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 49138, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39308, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = 0cb1746a-7366-4655-a56d-1172609a9ba3
31702024-10-09T22:52:15.380ZDEBGtest_unauthorized (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 49138, target: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39308, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 4997, tv_nsec: 209964287 } })
31712024-10-09T22:52:15.380ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
31722024-10-09T22:52:15.380ZTRACtest_unauthorized (DnsResolver): lookup_service_targets: looking up SRV target
31732024-10-09T22:52:15.382ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 60 fc 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e `...........-den\n0010: 64 72 69 74 65 2d 30 33 39 62 65 35 36 30 2d 35 drite-039be560-5\n0020: 34 63 63 2d 34 39 65 33 2d 38 38 64 66 2d 31 61 4cc-49e3-88df-1a\n0030: 32 39 64 61 64 62 66 39 31 33 04 68 6f 73 74 0d 29dadbf913.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:60323 req_id = b20c449e-ee7f-42df-8157-db9a6e1b00cb
31742024-10-09T22:52:15.383ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 24828,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 48,\n 51,\n 57,\n 98,\n 101,\n 53,\n 54,\n 48,\n 45,\n 53,\n 52,\n 99,\n 99,\n 45,\n 52,\n 57,\n 101,\n 51,\n 45,\n 56,\n 56,\n 100,\n 102,\n 45,\n 49,\n 97,\n 50,\n 57,\n 100,\n 97,\n 100,\n 98,\n 102,\n 57,\n 49,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60323 req_id = b20c449e-ee7f-42df-8157-db9a6e1b00cb
31752024-10-09T22:52:15.383ZDEBGtest_unauthorized (store): query key key = dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host
31762024-10-09T22:52:15.383ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:60323 query = LowerQuery { name: LowerName(Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-039be560-54cc-49e3-88df-1a29dadbf913.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = b20c449e-ee7f-42df-8157-db9a6e1b00cb
31772024-10-09T22:52:15.383ZTRACtest_unauthorized (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 26 fa 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e &...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:54962 req_id = fd439453-fff7-4919-adbf-24f77fdb20fa
31782024-10-09T22:52:15.384ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 9978,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:54962 req_id = fd439453-fff7-4919-adbf-24f77fdb20fa
31792024-10-09T22:52:15.384ZDEBGtest_unauthorized (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
31802024-10-09T22:52:15.384ZDEBGtest_unauthorized (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:54962 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = fd439453-fff7-4919-adbf-24f77fdb20fa
31812024-10-09T22:52:15.627ZTRACtest_unauthorized (DnsResolver): lookup_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
31822024-10-09T22:52:15.629ZTRACtest_unauthorized (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 48 94 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c H............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:56318 req_id = 5585a0f0-39cd-425d-972b-7abbef458520
31832024-10-09T22:52:15.629ZDEBGtest_unauthorized (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 18580,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56318 req_id = 5585a0f0-39cd-425d-972b-7abbef458520
31842024-10-09T22:52:15.629ZDEBGtest_unauthorized (store): query key key = _clickhouse-admin-keeper._tcp
31852024-10-09T22:52:15.629ZERROtest_unauthorized (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 18580, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56318 req_id = 5585a0f0-39cd-425d-972b-7abbef458520
31862024-10-09T22:52:15.629ZDEBGtest_unauthorized (BackgroundTasks): begin collection background_task = inventory_collection
31872024-10-09T22:52:15.629ZDEBGtest_unauthorized (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:49138
31882024-10-09T22:52:15.629ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/ignition
31892024-10-09T22:52:15.635ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f044580-8348-43c3-ba04-6e18201a23a4", "content-length": "835", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31902024-10-09T22:52:15.635ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0
31912024-10-09T22:52:15.656ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e5eed792-b2b4-4540-9e32-1f13b0209a43", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31922024-10-09T22:52:15.657ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=0
31932024-10-09T22:52:15.660ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "211a9735-eb0c-4ecb-8140-9b89d2577b5d", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31942024-10-09T22:52:15.660ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=1
31952024-10-09T22:52:15.663ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "9f539f53-9d9d-4060-a223-6d37077653cf", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31962024-10-09T22:52:15.664ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=0
31972024-10-09T22:52:15.665ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3b65b830-d2c6-4155-a26f-1bebcff83da6", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
31982024-10-09T22:52:15.665ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=1
31992024-10-09T22:52:15.667ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "df7998e3-fed3-45f5-b6c1-5ae48abde986", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32002024-10-09T22:52:15.668ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=0
32012024-10-09T22:52:15.669ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "52b82346-67fc-47de-9532-5a5db02f2bf3", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32022024-10-09T22:52:15.669ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=1
32032024-10-09T22:52:15.671ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "91e4a705-0eee-4439-8067-ca8f7a41964e", "content-length": "175", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32042024-10-09T22:52:15.671ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cmpa
32052024-10-09T22:52:15.672ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "bc8d8f6a-6263-4597-ba02-cb33ba0d8d02", "content-length": "702", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32062024-10-09T22:52:15.672ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
32072024-10-09T22:52:15.674ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c70b76ba-0d68-41a7-8d43-44170b0cf6d1", "content-length": "727", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32082024-10-09T22:52:15.674ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
32092024-10-09T22:52:15.676ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ba68ddd-f6a0-44a8-999c-4c899b252167", "content-length": "729", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32102024-10-09T22:52:15.676ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/0/component/rot/cfpa
32112024-10-09T22:52:15.679ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c5e935d4-451e-4628-87e3-8090e84e8fc0", "content-length": "728", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32122024-10-09T22:52:15.679ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1
32132024-10-09T22:52:15.681ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "664be41c-ae82-4f84-9802-128961847c4a", "content-length": "734", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32142024-10-09T22:52:15.681ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=0
32152024-10-09T22:52:15.687ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5d92f5ca-6d1b-4de6-810b-f62124feecdd", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32162024-10-09T22:52:15.688ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=1
32172024-10-09T22:52:15.690ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c80e0f1b-bfa5-4c87-b9ab-ae961181b550", "content-length": "111", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32182024-10-09T22:52:15.690ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=0
32192024-10-09T22:52:15.694ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "657c2c64-9957-40d0-be62-d46a679c1035", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32202024-10-09T22:52:15.694ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=1
32212024-10-09T22:52:15.699ZDEBGtest_unauthorized (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:49138 result = Ok(Response { url: "http://[::1]:49138/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "70688771-76a2-426c-8ee5-8f7cc8deeac8", "content-length": "167", "date": "Wed, 09 Oct 2024 22:52:15 GMT"} })
32222024-10-09T22:52:15.699ZDEBGtest_unauthorized (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:49138 method = GET uri = http://[::1]:49138/sp/switch/1/component/stage0/caboose?firmware_slot=0
32232024-10-09T22:52:15.701ZDEBGtest_unauthorized: attempt to fetch latest inventory collection result = Err(InternalError { internal_message: "unexpected database error: query `SELECT \\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\", \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\", \\"inv_clickhouse_keeper_membership\\".\\"leader_committed_log_index\\", \\"inv_clickhouse_keeper_membership\\".\\"raft_config\\" FROM \\"inv_clickhouse_keeper_membership\\" WHERE (\\"inv_clickhouse_keeper_membership\\".\\"inv_collection_id\\" = $1) ORDER BY \\"inv_clickhouse_keeper_membership\\".\\"queried_keeper_id\\" ASC LIMIT $2` contains a full table/index scan which is explicitly disallowed" })